<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 21 Apr 2026 17:22:27 +0000</lastBuildDate>
    <item>
      <title>ada87338-c8f8-4d30-8ca0-504613ec31ca</title>
      <link>https://db.gcve.eu/sighting/ada87338-c8f8-4d30-8ca0-504613ec31ca/export</link>
      <description>{"uuid": "ada87338-c8f8-4d30-8ca0-504613ec31ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32298", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "ada87338-c8f8-4d30-8ca0-504613ec31ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32298", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ada87338-c8f8-4d30-8ca0-504613ec31ca/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>c5200b43-6cef-433c-80ed-afc791961383</title>
      <link>https://db.gcve.eu/sighting/c5200b43-6cef-433c-80ed-afc791961383/export</link>
      <description>{"uuid": "c5200b43-6cef-433c-80ed-afc791961383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32296", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "c5200b43-6cef-433c-80ed-afc791961383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32296", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c5200b43-6cef-433c-80ed-afc791961383/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>7ff6514f-4521-4861-ba18-9756d99dd7cd</title>
      <link>https://db.gcve.eu/sighting/7ff6514f-4521-4861-ba18-9756d99dd7cd/export</link>
      <description>{"uuid": "7ff6514f-4521-4861-ba18-9756d99dd7cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32292", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "7ff6514f-4521-4861-ba18-9756d99dd7cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32292", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7ff6514f-4521-4861-ba18-9756d99dd7cd/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>332efcd4-5e86-4aa2-947f-00c29d9d9cb9</title>
      <link>https://db.gcve.eu/sighting/332efcd4-5e86-4aa2-947f-00c29d9d9cb9/export</link>
      <description>{"uuid": "332efcd4-5e86-4aa2-947f-00c29d9d9cb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32295", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "332efcd4-5e86-4aa2-947f-00c29d9d9cb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32295", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/332efcd4-5e86-4aa2-947f-00c29d9d9cb9/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>63e3fe48-7b1a-4142-9387-ca1e264dade5</title>
      <link>https://db.gcve.eu/sighting/63e3fe48-7b1a-4142-9387-ca1e264dade5/export</link>
      <description>{"uuid": "63e3fe48-7b1a-4142-9387-ca1e264dade5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32294", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "63e3fe48-7b1a-4142-9387-ca1e264dade5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32294", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/63e3fe48-7b1a-4142-9387-ca1e264dade5/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>f9069381-8517-45f3-a896-c1fad4257a5e</title>
      <link>https://db.gcve.eu/sighting/f9069381-8517-45f3-a896-c1fad4257a5e/export</link>
      <description>{"uuid": "f9069381-8517-45f3-a896-c1fad4257a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32293", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "f9069381-8517-45f3-a896-c1fad4257a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32293", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f9069381-8517-45f3-a896-c1fad4257a5e/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>97b3ae9e-d4ee-4379-b270-9214896bbb72</title>
      <link>https://db.gcve.eu/sighting/97b3ae9e-d4ee-4379-b270-9214896bbb72/export</link>
      <description>{"uuid": "97b3ae9e-d4ee-4379-b270-9214896bbb72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32291", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "97b3ae9e-d4ee-4379-b270-9214896bbb72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32291", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/97b3ae9e-d4ee-4379-b270-9214896bbb72/export</guid>
      <pubDate>Thu, 19 Mar 2026 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>6f7326b1-7881-4f5a-b820-417be5a7023a</title>
      <link>https://db.gcve.eu/sighting/6f7326b1-7881-4f5a-b820-417be5a7023a/export</link>
      <description>{"uuid": "6f7326b1-7881-4f5a-b820-417be5a7023a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32299", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhr53alsvy2q", "creation_timestamp": "2026-03-23T22:43:12.582418Z"}</description>
      <content:encoded>{"uuid": "6f7326b1-7881-4f5a-b820-417be5a7023a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32299", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhr53alsvy2q", "creation_timestamp": "2026-03-23T22:43:12.582418Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6f7326b1-7881-4f5a-b820-417be5a7023a/export</guid>
      <pubDate>Mon, 23 Mar 2026 22:43:12 +0000</pubDate>
    </item>
    <item>
      <title>4ffc19de-10c1-414c-b773-61faebdedaf5</title>
      <link>https://db.gcve.eu/sighting/4ffc19de-10c1-414c-b773-61faebdedaf5/export</link>
      <description>{"uuid": "4ffc19de-10c1-414c-b773-61faebdedaf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32299", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhtzo455hr2i", "creation_timestamp": "2026-03-25T02:20:09.322753Z"}</description>
      <content:encoded>{"uuid": "4ffc19de-10c1-414c-b773-61faebdedaf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32299", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhtzo455hr2i", "creation_timestamp": "2026-03-25T02:20:09.322753Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4ffc19de-10c1-414c-b773-61faebdedaf5/export</guid>
      <pubDate>Wed, 25 Mar 2026 02:20:09 +0000</pubDate>
    </item>
    <item>
      <title>f9159c36-128b-46d8-b0b1-ee34af316e69</title>
      <link>https://db.gcve.eu/sighting/f9159c36-128b-46d8-b0b1-ee34af316e69/export</link>
      <description>{"uuid": "f9159c36-128b-46d8-b0b1-ee34af316e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32295", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mj4c36fpfd2v", "creation_timestamp": "2026-04-10T02:37:07.328818Z"}</description>
      <content:encoded>{"uuid": "f9159c36-128b-46d8-b0b1-ee34af316e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32295", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mj4c36fpfd2v", "creation_timestamp": "2026-04-10T02:37:07.328818Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f9159c36-128b-46d8-b0b1-ee34af316e69/export</guid>
      <pubDate>Fri, 10 Apr 2026 02:37:07 +0000</pubDate>
    </item>
  </channel>
</rss>
