<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T04:08:08.851700+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b993874a-2f6c-4763-a7c8-76bea447e669/export</id>
    <title>b993874a-2f6c-4763-a7c8-76bea447e669</title>
    <updated>2026-05-07T04:08:08.871108+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b993874a-2f6c-4763-a7c8-76bea447e669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32089", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b993874a-2f6c-4763-a7c8-76bea447e669/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/99db4484-68c6-4f64-a223-62db66bf36a9/export</id>
    <title>99db4484-68c6-4f64-a223-62db66bf36a9</title>
    <updated>2026-05-07T04:08:08.871004+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "99db4484-68c6-4f64-a223-62db66bf36a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32083", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/99db4484-68c6-4f64-a223-62db66bf36a9/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa41b07e-86aa-4c38-a669-0678215b9ba6/export</id>
    <title>fa41b07e-86aa-4c38-a669-0678215b9ba6</title>
    <updated>2026-05-07T04:08:08.870904+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa41b07e-86aa-4c38-a669-0678215b9ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32080", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa41b07e-86aa-4c38-a669-0678215b9ba6/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b7fd9448-655d-4c77-8c2b-6f2cc4e8aec7/export</id>
    <title>b7fd9448-655d-4c77-8c2b-6f2cc4e8aec7</title>
    <updated>2026-05-07T04:08:08.870798+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b7fd9448-655d-4c77-8c2b-6f2cc4e8aec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32084", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b7fd9448-655d-4c77-8c2b-6f2cc4e8aec7/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6d1ad4ad-22d6-4f76-8751-4e0de49e0db7/export</id>
    <title>6d1ad4ad-22d6-4f76-8751-4e0de49e0db7</title>
    <updated>2026-05-07T04:08:08.870695+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6d1ad4ad-22d6-4f76-8751-4e0de49e0db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32081", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6d1ad4ad-22d6-4f76-8751-4e0de49e0db7/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c186990-c76a-4d99-b493-99c4cd10de4e/export</id>
    <title>1c186990-c76a-4d99-b493-99c4cd10de4e</title>
    <updated>2026-05-07T04:08:08.870591+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c186990-c76a-4d99-b493-99c4cd10de4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32085", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c186990-c76a-4d99-b493-99c4cd10de4e/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b12b35a8-ee76-4262-8699-338682331285/export</id>
    <title>b12b35a8-ee76-4262-8699-338682331285</title>
    <updated>2026-05-07T04:08:08.870475+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b12b35a8-ee76-4262-8699-338682331285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32086", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b12b35a8-ee76-4262-8699-338682331285/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/00e0b412-879d-407c-8901-799f5ca566f2/export</id>
    <title>00e0b412-879d-407c-8901-799f5ca566f2</title>
    <updated>2026-05-07T04:08:08.870346+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "00e0b412-879d-407c-8901-799f5ca566f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32087", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119", "content": "", "creation_timestamp": "2026-04-15T06:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/00e0b412-879d-407c-8901-799f5ca566f2/export"/>
    <published>2026-04-15T06:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3c50195-7136-4a11-ba08-9597db822245/export</id>
    <title>f3c50195-7136-4a11-ba08-9597db822245</title>
    <updated>2026-05-07T04:08:08.870180+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3c50195-7136-4a11-ba08-9597db822245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3208", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml5yxgbxae2c", "content": "CVE-2026-3208 - Mercado Pago payments for WooCommerce\nCVE ID : CVE-2026-3208\n \n Published : May 6, 2026, 3:27 a.m. | 55\u00a0minutes ago\n \n Description : The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing cap...", "creation_timestamp": "2026-05-06T05:49:40.349798Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3c50195-7136-4a11-ba08-9597db822245/export"/>
    <published>2026-05-06T05:49:40.349798+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e27edc54-abe9-441b-9aa7-25504aa5ae0d/export</id>
    <title>e27edc54-abe9-441b-9aa7-25504aa5ae0d</title>
    <updated>2026-05-07T04:08:08.867831+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e27edc54-abe9-441b-9aa7-25504aa5ae0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3208", "type": "seen", "source": "https://bsky.app/profile/donwebmedia.bsky.social/post/3ml6lmka4fb2c", "content": "CVE-2026-3208: Mercado Pago expone claves PIX\n\n\u00bfTu tienda usa Mercado Pago con PIX? La vulnerabilidad CVE-2026-3208 expone claves PIX y CPF sin autenticaci\u00f3n. Verific\u00e1 tu versi\u00f3n y actualiz\u00e1 ahora.\n\n#cve20263208 #mercadopago #woocommerce #pix #wordfence", "creation_timestamp": "2026-05-06T11:23:36.995909Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e27edc54-abe9-441b-9aa7-25504aa5ae0d/export"/>
    <published>2026-05-06T11:23:36.995909+00:00</published>
  </entry>
</feed>
