<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T14:09:49.888610+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bfa6e951-0382-424e-94a4-2475fc9abdc6/export</id>
    <title>bfa6e951-0382-424e-94a4-2475fc9abdc6</title>
    <updated>2026-05-06T14:09:49.896052+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bfa6e951-0382-424e-94a4-2475fc9abdc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/cybersecurity0001.bsky.social/post/3ml4buhm5762b", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks", "creation_timestamp": "2026-05-05T13:24:00.109792Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bfa6e951-0382-424e-94a4-2475fc9abdc6/export"/>
    <published>2026-05-05T13:24:00.109792+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5770fd71-f4a0-43cc-8c1c-d3618509544c/export</id>
    <title>5770fd71-f4a0-43cc-8c1c-d3618509544c</title>
    <updated>2026-05-06T14:09:49.895956+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5770fd71-f4a0-43cc-8c1c-d3618509544c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml4bwabkpp2e", "content": "MetInfo CMS 7.9, 8.0, 8.1\u306b\u8a8d\u8a3c\u306a\u3057PHP\u30b3\u30fc\u30c9\u5b9f\u884c\u306e\u8106\u5f31\u6027\uff08CVE-2026-29014\uff09\u3042\u308a\u3002\u653b\u6483\u8005\u306f\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u53ef\u80fd\u3002", "creation_timestamp": "2026-05-05T13:24:45.141531Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5770fd71-f4a0-43cc-8c1c-d3618509544c/export"/>
    <published>2026-05-05T13:24:45.141531+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7845a958-a9ff-422b-9ccc-b4611ab69fd1/export</id>
    <title>7845a958-a9ff-422b-9ccc-b4611ab69fd1</title>
    <updated>2026-05-06T14:09:49.895862+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7845a958-a9ff-422b-9ccc-b4611ab69fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml4ciibyrd2u", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks", "creation_timestamp": "2026-05-05T13:34:57.542346Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7845a958-a9ff-422b-9ccc-b4611ab69fd1/export"/>
    <published>2026-05-05T13:34:57.542346+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f992073-8d25-4974-af96-74a0a7eccdc0/export</id>
    <title>4f992073-8d25-4974-af96-74a0a7eccdc0</title>
    <updated>2026-05-06T14:09:49.895768+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f992073-8d25-4974-af96-74a0a7eccdc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-29014", "type": "seen", "source": "https://bsky.app/profile/montxt.bsky.social/post/3ml4d7mzeba2v", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks  https://thehackernews.com/2026/05/metinfo-cms-cve-2026-29014-exploited.html", "creation_timestamp": "2026-05-05T13:47:53.781982Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f992073-8d25-4974-af96-74a0a7eccdc0/export"/>
    <published>2026-05-05T13:47:53.781982+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1e7f7e8-814c-4c3a-8e3c-4e453df2e86c/export</id>
    <title>c1e7f7e8-814c-4c3a-8e3c-4e453df2e86c</title>
    <updated>2026-05-06T14:09:49.895667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1e7f7e8-814c-4c3a-8e3c-4e453df2e86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116522561593846577", "content": "\ud83d\udcf0 Critical MetInfo CMS Vulnerability Under Active Exploitation\n\ud83d\udea8 ACTIVE EXPLOITATION! A critical RCE flaw (CVE-2026-29014, CVSS 9.8) in MetInfo CMS is being widely exploited. Unauthenticated attackers can gain full server control. Patch immediately! #CVE #RCE #CyberSecurity #Vulnerability\n\ud83d\udd17 https://cyber.netsecops.io", "creation_timestamp": "2026-05-05T15:00:09.467756Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1e7f7e8-814c-4c3a-8e3c-4e453df2e86c/export"/>
    <published>2026-05-05T15:00:09.467756+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d317f017-1d66-44a6-8bfe-f3945c96fc70/export</id>
    <title>d317f017-1d66-44a6-8bfe-f3945c96fc70</title>
    <updated>2026-05-06T14:09:49.895548+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d317f017-1d66-44a6-8bfe-f3945c96fc70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3ml4hb3sa4n2m", "content": "\ud83d\udea8 ACTIVE EXPLOITATION! A critical RCE flaw (CVE-2026-29014, CVSS 9.8) in MetInfo CMS is being widely exploited. Unauthenticated attackers can gain full server control. Patch immediately! #CVE #RCE #CyberSecurity #Vulnerability", "creation_timestamp": "2026-05-05T15:00:18.750475Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d317f017-1d66-44a6-8bfe-f3945c96fc70/export"/>
    <published>2026-05-05T15:00:18.750475+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/99d529aa-fb9a-47ec-8302-4d50a3fcbf70/export</id>
    <title>99d529aa-fb9a-47ec-8302-4d50a3fcbf70</title>
    <updated>2026-05-06T14:09:49.895432+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "99d529aa-fb9a-47ec-8302-4d50a3fcbf70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3ml4imap35s26", "content": "Threat actors are actively exploiting CVE-2026-29014, a critical code injection flaw in MetInfo CMS. The vulnerability allows remote, unauthenticated attackers [\u2026]", "creation_timestamp": "2026-05-05T15:24:26.477979Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/99d529aa-fb9a-47ec-8302-4d50a3fcbf70/export"/>
    <published>2026-05-05T15:24:26.477979+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a897173c-2e1a-4481-8c83-96feafcffa24/export</id>
    <title>a897173c-2e1a-4481-8c83-96feafcffa24</title>
    <updated>2026-05-06T14:09:49.895313+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a897173c-2e1a-4481-8c83-96feafcffa24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/10152", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks \u2013 thehackernews.com\n\nTue, 05 May 2026 19:56:00", "creation_timestamp": "2026-05-05T16:03:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a897173c-2e1a-4481-8c83-96feafcffa24/export"/>
    <published>2026-05-05T16:03:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/87a10290-eaa1-45a6-9000-cb46d48ef99e/export</id>
    <title>87a10290-eaa1-45a6-9000-cb46d48ef99e</title>
    <updated>2026-05-06T14:09:49.895159+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "87a10290-eaa1-45a6-9000-cb46d48ef99e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "Telegram/mH9W_yuxOmzENs3bQFLbHHEWMwEHnxxDCe_RWaigepYXtg", "content": "", "creation_timestamp": "2026-05-05T17:10:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/87a10290-eaa1-45a6-9000-cb46d48ef99e/export"/>
    <published>2026-05-05T17:10:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/74efedf7-451b-493c-bb9c-69bf4eaf9790/export</id>
    <title>74efedf7-451b-493c-bb9c-69bf4eaf9790</title>
    <updated>2026-05-06T14:09:49.893707+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "74efedf7-451b-493c-bb9c-69bf4eaf9790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ml6gwudqek2g", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks\n\nThreat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck.\nThe vulnerability in question\u2026\n#hackernews #news", "creation_timestamp": "2026-05-06T09:59:55.857241Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/74efedf7-451b-493c-bb9c-69bf4eaf9790/export"/>
    <published>2026-05-06T09:59:55.857241+00:00</published>
  </entry>
</feed>
