<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T02:21:47.502771+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6bcc2be4-7233-4524-b864-afc0551c5001/export</id>
    <title>6bcc2be4-7233-4524-b864-afc0551c5001</title>
    <updated>2026-05-09T02:21:47.520227+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6bcc2be4-7233-4524-b864-afc0551c5001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mk6fgor5ex2n", "content": "", "creation_timestamp": "2026-04-23T16:07:54.348441Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6bcc2be4-7233-4524-b864-afc0551c5001/export"/>
    <published>2026-04-23T16:07:54.348441+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5f46cd86-b604-4459-ba40-593f3d3dee20/export</id>
    <title>5f46cd86-b604-4459-ba40-593f3d3dee20</title>
    <updated>2026-05-09T02:21:47.520145+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5f46cd86-b604-4459-ba40-593f3d3dee20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/intel.overresearched.net/post/3mk6ue2g2lc2q", "content": "", "creation_timestamp": "2026-04-23T20:34:44.981634Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5f46cd86-b604-4459-ba40-593f3d3dee20/export"/>
    <published>2026-04-23T20:34:44.981634+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9174c9e2-c31e-4d6d-bcce-723207b63b28/export</id>
    <title>9174c9e2-c31e-4d6d-bcce-723207b63b28</title>
    <updated>2026-05-09T02:21:47.520058+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9174c9e2-c31e-4d6d-bcce-723207b63b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mk7i6drwho2g", "content": "", "creation_timestamp": "2026-04-24T02:29:28.200348Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9174c9e2-c31e-4d6d-bcce-723207b63b28/export"/>
    <published>2026-04-24T02:29:28.200348+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0950fcd7-7323-4dc3-a80f-eb9e974ea4ae/export</id>
    <title>0950fcd7-7323-4dc3-a80f-eb9e974ea4ae</title>
    <updated>2026-05-09T02:21:47.519975+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0950fcd7-7323-4dc3-a80f-eb9e974ea4ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkbymlltlg2v", "content": "", "creation_timestamp": "2026-04-25T02:29:06.745043Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0950fcd7-7323-4dc3-a80f-eb9e974ea4ae/export"/>
    <published>2026-04-25T02:29:06.745043+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47d2c44e-1dad-42cb-9dd1-470e332ab5b2/export</id>
    <title>47d2c44e-1dad-42cb-9dd1-470e332ab5b2</title>
    <updated>2026-05-09T02:21:47.519892+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "47d2c44e-1dad-42cb-9dd1-470e332ab5b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkej4m65mr2x", "content": "", "creation_timestamp": "2026-04-26T02:29:41.356767Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47d2c44e-1dad-42cb-9dd1-470e332ab5b2/export"/>
    <published>2026-04-26T02:29:41.356767+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/71bea0bf-fdfa-4de1-b2aa-7cc3b2c68af7/export</id>
    <title>71bea0bf-fdfa-4de1-b2aa-7cc3b2c68af7</title>
    <updated>2026-05-09T02:21:47.519779+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "71bea0bf-fdfa-4de1-b2aa-7cc3b2c68af7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/talalabbasi.com/post/3mkgjfxjiw224", "content": "", "creation_timestamp": "2026-04-26T21:40:18.914804Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/71bea0bf-fdfa-4de1-b2aa-7cc3b2c68af7/export"/>
    <published>2026-04-26T21:40:18.914804+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/08f292f1-dc65-4ab1-8692-4afca020667b/export</id>
    <title>08f292f1-dc65-4ab1-8692-4afca020667b</title>
    <updated>2026-05-09T02:21:47.519688+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "08f292f1-dc65-4ab1-8692-4afca020667b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkgzljmjvd2z", "content": "", "creation_timestamp": "2026-04-27T02:29:41.009918Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/08f292f1-dc65-4ab1-8692-4afca020667b/export"/>
    <published>2026-04-27T02:29:41.009918+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3e12cb4f-effd-40ee-a56b-d8fe1ca77a76/export</id>
    <title>3e12cb4f-effd-40ee-a56b-d8fe1ca77a76</title>
    <updated>2026-05-09T02:21:47.519597+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3e12cb4f-effd-40ee-a56b-d8fe1ca77a76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/newstecnicas.info.ve/post/3mkkoxamnf22t", "content": "", "creation_timestamp": "2026-04-28T13:30:00.957004Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3e12cb4f-effd-40ee-a56b-d8fe1ca77a76/export"/>
    <published>2026-04-28T13:30:00.957004+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ee7f1497-c730-48c2-b9fc-570d991ded9c/export</id>
    <title>ee7f1497-c730-48c2-b9fc-570d991ded9c</title>
    <updated>2026-05-09T02:21:47.519463+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ee7f1497-c730-48c2-b9fc-570d991ded9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mkyvou5gcj2p", "content": "Microsoft patched the SharePoint zero-day CVE-2026-32201 in April - no login, no user interaction required to exploit. CISA required federal agencies to remediate by April 28. One week after that deadline, over 1,300 SharePoint servers are still publicly exposed.", "creation_timestamp": "2026-05-04T05:07:53.062408Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ee7f1497-c730-48c2-b9fc-570d991ded9c/export"/>
    <published>2026-05-04T05:07:53.062408+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/756b8500-bd1d-4d08-853f-9ca5ca6e6a7f/export</id>
    <title>756b8500-bd1d-4d08-853f-9ca5ca6e6a7f</title>
    <updated>2026-05-09T02:21:47.517546+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "756b8500-bd1d-4d08-853f-9ca5ca6e6a7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32201", "type": "seen", "source": "https://gist.github.com/nrf0009-09/957d21fe0408108bccb397435cb6692a", "content": "\n\n\n  \n\n    Noticias de Noelia\n\n    https://gist.githubusercontent.com/nrf0009-09/957d21fe0408108bccb397435cb6692a/raw/12124d004fb2e8e0037740046f544f018418cd94/noticias.xml\n\n    \n      Canal RSS especializado en noticias t\u00e9cnicas sobre sistemas,\n      ciberseguridad y administraci\u00f3n inform\u00e1tica.\n    \n\n    es\n\n    \n    \n      Microsoft corrige vulnerabilidades cr\u00edticas en Windows\n\n      \n       https://unaaldia.hispasec.com/2026/04/microsoft-corrige-un-zero-day-en-sharepoint-y-parchea-169-vulnerabilidades.html\n      \n\n      \n          Microsoft ha corregido 169 vulnerabilidades en su \u00faltima oleada de parches,\n           incluyendo una zero-day activamente explotada en SharePoint Server CVE-2026-32201 y varios fallos cr\u00edticos en Windows Defender \n           y servicios de red. Estas vulnerabilidades afectan a m\u00faltiples versiones de Windows, incluyendo Windows 11 y tambi\u00e9n Windows 10 en \n           sistemas que a\u00fan reciben actualizaciones de seguridad. Las organizaciones deben priorizar estas actualizaciones para evitar ataques potenciales.\n        \n\n        \n      ]]&amp;gt;\n\n      \n        https://unaaldia.hispasec.com/2026/04/microsoft-corrige-un-zero-day-en-sharepoint-y-parchea-169-vulnerabilidades.html\n      \n\n      nrf0009@alu.medac.es\n\n      Fri, 08 May 2026 08:00:00 GMT\n    \n\n    \n    \n      Alertan de dos nuevas estafas que suplantan a DHL\n\n      \n        https://www.20minutos.es/tecnologia/ciberseguridad/alertan-dos-nuevas-estafas-que-suplantan-dhl-no-piques-si-te-llegan-estos-correos-electronicos_6966903_0.html\n      \n\n      \n         Una nueva estafa de suplantaci\u00f3n de identidad vuelve a amenazar a los usuarios. En este caso, los ciberdelincuentes \n         se hacen pasar por la empresa de servicios de mensajer\u00eda DHL a trav\u00e9s de un mensaje en forma de correo electr\u00f3nico. \n         Este tipo de fraudes tiene como objetivo robar informaci\u00f3n personal y bancaria, adem\u00e1s de comprometer los sistemas de las v\u00edctimas. \n        \n\n        \n      ]]&amp;gt;\n\n      \n        https://www.20minutos.es/tecnologia/ciberseguridad/alertan-dos-nuevas-estafas-que-suplantan-dhl-no-piques-si-te-llegan-estos-correos-electronicos_6966903_0.html\n      \n\n      nrf0009@alu.medac.es\n\n      Fri, 08 May 2026 08:00:00 GMT\n    \n\n    \n    \n      El kernel Linux 7.0 llega con mejoras de rendimiento, soporte para nuevo \n        hardware y un sistema de archivos XFS m\u00e1s inteligente\n\n      \n       https://www.l4b-software.com/es/linux-kernel-7-0-regulated-embedded-systems/\n      \n\n      \n         El n\u00facleo de Linux 7.0 es la versi\u00f3n principal actual en el momento de redactar este art\u00edculo, pero el cambio de versi\u00f3n en s\u00ed mismo es \n         principalmente una cuesti\u00f3n de mantenimiento. La verdadera pregunta para los equipos de ingenier\u00eda que desarrollan sistemas embebidos regulados \n         no es si la versi\u00f3n 7.0 lo cambia todo, sino si el \u00faltimo ciclo del n\u00facleo mejora de manera significativa el comportamiento temporal, \n         la facilidad de mantenimiento, el nivel de seguridad y la estrategia de actualizaci\u00f3n lo suficiente como para justificar su adopci\u00f3n.\n        \n\n        \n      ]]&amp;gt;\n\n      \n        https://www.l4b-software.com/es/linux-kernel-7-0-regulated-embedded-systems/\n      \n\n      nrf0009@alu.medac.es\n\n      Fri, 08 May 2026 08:00:00 GMT\n    \n\n  \n", "creation_timestamp": "2026-05-08T07:07:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/756b8500-bd1d-4d08-853f-9ca5ca6e6a7f/export"/>
    <published>2026-05-08T07:07:57+00:00</published>
  </entry>
</feed>
