<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T12:51:32.211511+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e829f125-ee4b-4930-88fa-19defed3ca02/export</id>
    <title>e829f125-ee4b-4930-88fa-19defed3ca02</title>
    <updated>2026-05-20T12:51:32.217836+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e829f125-ee4b-4930-88fa-19defed3ca02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-authenticated-remote-code-execution-vulnerability-ivanti-epmm-exploited-patch", "content": "", "creation_timestamp": "2026-05-07T07:54:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e829f125-ee4b-4930-88fa-19defed3ca02/export"/>
    <published>2026-05-07T07:54:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5ed19d05-aeca-4ad9-865e-d1fc2b1e2a2a/export</id>
    <title>5ed19d05-aeca-4ad9-865e-d1fc2b1e2a2a</title>
    <updated>2026-05-20T12:51:32.217786+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "5ed19d05-aeca-4ad9-865e-d1fc2b1e2a2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-2026-12?mtm_campaign=rss&amp;amp;mtm_source=rss&amp;amp;mtm_medium=rss", "content": "", "creation_timestamp": "2026-05-07T08:14:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5ed19d05-aeca-4ad9-865e-d1fc2b1e2a2a/export"/>
    <published>2026-05-07T08:14:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fdb22474-a1bb-47f1-b438-0228c44de850/export</id>
    <title>fdb22474-a1bb-47f1-b438-0228c44de850</title>
    <updated>2026-05-20T12:51:32.217739+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "fdb22474-a1bb-47f1-b438-0228c44de850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0135", "content": "", "creation_timestamp": "2026-05-07T09:17:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fdb22474-a1bb-47f1-b438-0228c44de850/export"/>
    <published>2026-05-07T09:17:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/60d9fa5f-3079-4796-b8a1-b27051efe243/export</id>
    <title>60d9fa5f-3079-4796-b8a1-b27051efe243</title>
    <updated>2026-05-20T12:51:32.217690+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "60d9fa5f-3079-4796-b8a1-b27051efe243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mlbljw4svm2u", "content": "", "creation_timestamp": "2026-05-07T16:00:07.441186Z"}</content>
    <link href="https://db.gcve.eu/sighting/60d9fa5f-3079-4796-b8a1-b27051efe243/export"/>
    <published>2026-05-07T16:00:07.441186+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d79d947e-d581-4953-8f39-37de565326d1/export</id>
    <title>d79d947e-d581-4953-8f39-37de565326d1</title>
    <updated>2026-05-20T12:51:32.217635+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d79d947e-d581-4953-8f39-37de565326d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlboyaudhc2l", "content": "", "creation_timestamp": "2026-05-07T17:01:50.360486Z"}</content>
    <link href="https://db.gcve.eu/sighting/d79d947e-d581-4953-8f39-37de565326d1/export"/>
    <published>2026-05-07T17:01:50.360486+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e4aa7b24-8f74-46a6-80de-fc2ed9426168/export</id>
    <title>e4aa7b24-8f74-46a6-80de-fc2ed9426168</title>
    <updated>2026-05-20T12:51:32.217577+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e4aa7b24-8f74-46a6-80de-fc2ed9426168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlbrjmextb2e", "content": "", "creation_timestamp": "2026-05-07T17:47:19.461164Z"}</content>
    <link href="https://db.gcve.eu/sighting/e4aa7b24-8f74-46a6-80de-fc2ed9426168/export"/>
    <published>2026-05-07T17:47:19.461164+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fe625369-0b55-4ed1-89ab-50c853afdcce/export</id>
    <title>fe625369-0b55-4ed1-89ab-50c853afdcce</title>
    <updated>2026-05-20T12:51:32.217517+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "fe625369-0b55-4ed1-89ab-50c853afdcce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://www.ncsc.nl/alerts/actief-misbruik-ivanti-endpoint-manager-mobile", "content": "", "creation_timestamp": "2026-05-08T04:17:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fe625369-0b55-4ed1-89ab-50c853afdcce/export"/>
    <published>2026-05-08T04:17:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/57fb1ddf-5af1-4250-b1e9-76eb8295e84b/export</id>
    <title>57fb1ddf-5af1-4250-b1e9-76eb8295e84b</title>
    <updated>2026-05-20T12:51:32.217454+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "57fb1ddf-5af1-4250-b1e9-76eb8295e84b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://t.me/true_secator/8189", "content": "", "creation_timestamp": "2026-05-08T18:30:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/57fb1ddf-5af1-4250-b1e9-76eb8295e84b/export"/>
    <published>2026-05-08T18:30:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/26de5943-9bd0-49ed-ac13-77dc125c6ec7/export</id>
    <title>26de5943-9bd0-49ed-ac13-77dc125c6ec7</title>
    <updated>2026-05-20T12:51:32.217370+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "26de5943-9bd0-49ed-ac13-77dc125c6ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mlkfknigcd2v", "content": "", "creation_timestamp": "2026-05-11T04:07:07.224302Z"}</content>
    <link href="https://db.gcve.eu/sighting/26de5943-9bd0-49ed-ac13-77dc125c6ec7/export"/>
    <published>2026-05-11T04:07:07.224302+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1ebc0092-693e-4dad-9a04-aeadab14646e/export</id>
    <title>1ebc0092-693e-4dad-9a04-aeadab14646e</title>
    <updated>2026-05-20T12:51:32.216469+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "1ebc0092-693e-4dad-9a04-aeadab14646e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-5786", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mma6wtug7k2w", "content": "", "creation_timestamp": "2026-05-19T20:07:16.630308Z"}</content>
    <link href="https://db.gcve.eu/sighting/1ebc0092-693e-4dad-9a04-aeadab14646e/export"/>
    <published>2026-05-19T20:07:16.630308+00:00</published>
  </entry>
</feed>
