<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T00:07:14.777973+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3775d3f9-6d18-4e10-83dc-0e9eb54d748b/export</id>
    <title>3775d3f9-6d18-4e10-83dc-0e9eb54d748b</title>
    <updated>2026-05-09T00:07:14.827964+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "3775d3f9-6d18-4e10-83dc-0e9eb54d748b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-22729", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-spring-ai", "content": "", "creation_timestamp": "2026-03-18T11:18:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3775d3f9-6d18-4e10-83dc-0e9eb54d748b/export"/>
    <published>2026-03-18T11:18:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fb6b4178-59a8-493a-9a40-6ce1bf64ec4d/export</id>
    <title>fb6b4178-59a8-493a-9a40-6ce1bf64ec4d</title>
    <updated>2026-05-09T00:07:14.826872+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "fb6b4178-59a8-493a-9a40-6ce1bf64ec4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-22729", "type": "published-proof-of-concept", "source": "https://blog.securelayer7.net/cve-2026-22729-jsonpath-injection-spring-ai-pgvectorstore/?jetpack_skip_subscription_popup", "content": "", "creation_timestamp": "2026-03-18T17:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fb6b4178-59a8-493a-9a40-6ce1bf64ec4d/export"/>
    <published>2026-03-18T17:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/76913032-3e11-48d6-b85b-90c54c76b579/export</id>
    <title>76913032-3e11-48d6-b85b-90c54c76b579</title>
    <updated>2026-05-09T00:07:14.826789+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "76913032-3e11-48d6-b85b-90c54c76b579", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-22721", "type": "seen", "source": "https://bsky.app/profile/oxfemale.bsky.social/post/3mhe63u7e372a", "content": "", "creation_timestamp": "2026-03-18T18:56:50.607424Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/76913032-3e11-48d6-b85b-90c54c76b579/export"/>
    <published>2026-03-18T18:56:50.607424+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b854bc80-1fd7-4dba-8e10-d5afc5eed3e1/export</id>
    <title>b854bc80-1fd7-4dba-8e10-d5afc5eed3e1</title>
    <updated>2026-05-09T00:07:14.826708+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b854bc80-1fd7-4dba-8e10-d5afc5eed3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22721", "type": "published-proof-of-concept", "source": "Telegram/jwLMEsD8NuChWoefALGqOM6CInpsDfvo5Mr42mCpu1zCLMmC", "content": "", "creation_timestamp": "2026-03-18T19:09:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b854bc80-1fd7-4dba-8e10-d5afc5eed3e1/export"/>
    <published>2026-03-18T19:09:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/af6fd1e7-9360-41e9-9495-b96f14434f95/export</id>
    <title>af6fd1e7-9360-41e9-9495-b96f14434f95</title>
    <updated>2026-05-09T00:07:14.826604+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "af6fd1e7-9360-41e9-9495-b96f14434f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22729", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3mhewky6pss2n", "content": "", "creation_timestamp": "2026-03-19T02:14:52.941146Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/af6fd1e7-9360-41e9-9495-b96f14434f95/export"/>
    <published>2026-03-19T02:14:52.941146+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4059dca8-9b47-4cf3-a8bd-02d5eb14a8f9/export</id>
    <title>4059dca8-9b47-4cf3-a8bd-02d5eb14a8f9</title>
    <updated>2026-05-09T00:07:14.826501+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4059dca8-9b47-4cf3-a8bd-02d5eb14a8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22729", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3mhfzopgjrh2t", "content": "", "creation_timestamp": "2026-03-19T12:43:13.653193Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4059dca8-9b47-4cf3-a8bd-02d5eb14a8f9/export"/>
    <published>2026-03-19T12:43:13.653193+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a70eb8f-6891-4c8e-8914-67a057f992cc/export</id>
    <title>4a70eb8f-6891-4c8e-8914-67a057f992cc</title>
    <updated>2026-05-09T00:07:14.826405+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a70eb8f-6891-4c8e-8914-67a057f992cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22729", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3mhg35rupi223", "content": "", "creation_timestamp": "2026-03-19T13:09:32.790671Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a70eb8f-6891-4c8e-8914-67a057f992cc/export"/>
    <published>2026-03-19T13:09:32.790671+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c14dc52-2c19-43f9-b791-5c34f7b24ccd/export</id>
    <title>3c14dc52-2c19-43f9-b791-5c34f7b24ccd</title>
    <updated>2026-05-09T00:07:14.826301+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c14dc52-2c19-43f9-b791-5c34f7b24ccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22729", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mhgsqega7s2o", "content": "", "creation_timestamp": "2026-03-19T20:11:32.725338Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c14dc52-2c19-43f9-b791-5c34f7b24ccd/export"/>
    <published>2026-03-19T20:11:32.725338+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d3354a3-8710-4a7a-9a2e-9c1e7d8dd76a/export</id>
    <title>8d3354a3-8710-4a7a-9a2e-9c1e7d8dd76a</title>
    <updated>2026-05-09T00:07:14.826174+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d3354a3-8710-4a7a-9a2e-9c1e7d8dd76a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-22729", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhmibd5t5x23", "content": "", "creation_timestamp": "2026-03-22T02:20:08.704636Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d3354a3-8710-4a7a-9a2e-9c1e7d8dd76a/export"/>
    <published>2026-03-22T02:20:08.704636+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02fb70b1-e6c2-4ced-9c69-970dfaac95ac/export</id>
    <title>02fb70b1-e6c2-4ced-9c69-970dfaac95ac</title>
    <updated>2026-05-09T00:07:14.822530+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02fb70b1-e6c2-4ced-9c69-970dfaac95ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22726", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkr3mgztss2e", "content": "CVE-2026-22726 - Route Services Firewall Bypass\nCVE ID : CVE-2026-22726\n \n Published : May 1, 2026, 12:16 a.m. | 2\u00a0hours, 2\u00a0minutes ago\n \n Description : Route Services can be leveraged to send app traffic to network destinations outside of an app's configured egress rules. As ...", "creation_timestamp": "2026-05-01T02:32:36.545258Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02fb70b1-e6c2-4ced-9c69-970dfaac95ac/export"/>
    <published>2026-05-01T02:32:36.545258+00:00</published>
  </entry>
</feed>
