<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T15:00:51.259192+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86ac45f9-5f38-437a-8107-a152dd87f7ed/export</id>
    <title>86ac45f9-5f38-437a-8107-a152dd87f7ed</title>
    <updated>2026-05-10T15:00:51.616920+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "86ac45f9-5f38-437a-8107-a152dd87f7ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-33115", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0116", "content": "", "creation_timestamp": "2026-04-14T12:20:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86ac45f9-5f38-437a-8107-a152dd87f7ed/export"/>
    <published>2026-04-14T12:20:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8e82a9d4-92e2-450d-8254-fa0799c28705/export</id>
    <title>8e82a9d4-92e2-450d-8254-fa0799c28705</title>
    <updated>2026-05-10T15:00:51.616835+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8e82a9d4-92e2-450d-8254-fa0799c28705", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33115", "type": "seen", "source": "https://www.thezdi.com/blog/2026/4/14/the-april-2026-security-update-review", "content": "", "creation_timestamp": "2026-04-14T15:49:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8e82a9d4-92e2-450d-8254-fa0799c28705/export"/>
    <published>2026-04-14T15:49:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1ee2d7a5-ab99-4da7-b05b-9cfefffce205/export</id>
    <title>1ee2d7a5-ab99-4da7-b05b-9cfefffce205</title>
    <updated>2026-05-10T15:00:51.616751+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1ee2d7a5-ab99-4da7-b05b-9cfefffce205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33115", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mji2y645mk25", "content": "", "creation_timestamp": "2026-04-14T19:02:07.851116Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1ee2d7a5-ab99-4da7-b05b-9cfefffce205/export"/>
    <published>2026-04-14T19:02:07.851116+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/306f633c-040c-4775-92a2-b43e5fd42d87/export</id>
    <title>306f633c-040c-4775-92a2-b43e5fd42d87</title>
    <updated>2026-05-10T15:00:51.616655+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "306f633c-040c-4775-92a2-b43e5fd42d87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33115", "type": "seen", "source": "Telegram/H2xfarAfQG6rJzRkW2eFZjTVMds3kULmSRbHMv_5GvH0iOc", "content": "", "creation_timestamp": "2026-04-14T20:16:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/306f633c-040c-4775-92a2-b43e5fd42d87/export"/>
    <published>2026-04-14T20:16:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9f7d536-d046-4ec3-bf16-1e76685d33ae/export</id>
    <title>d9f7d536-d046-4ec3-bf16-1e76685d33ae</title>
    <updated>2026-05-10T15:00:51.616504+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9f7d536-d046-4ec3-bf16-1e76685d33ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33115", "type": "seen", "source": "Telegram/YePRnuOVksNqX9swUImajlZDrf4i0O7tGfeTl8wpT5HyD2Q", "content": "", "creation_timestamp": "2026-04-14T20:17:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9f7d536-d046-4ec3-bf16-1e76685d33ae/export"/>
    <published>2026-04-14T20:17:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba017d79-c55f-44bd-bb7a-c63e551faa5d/export</id>
    <title>ba017d79-c55f-44bd-bb7a-c63e551faa5d</title>
    <updated>2026-05-10T15:00:51.614211+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba017d79-c55f-44bd-bb7a-c63e551faa5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33115", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkoqgk3eiw25", "content": "\ud83d\udccc CVE-2026-33115 - Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. https://www.cyberhub.blog/cves/CVE-2026-33115", "creation_timestamp": "2026-04-30T04:07:08.308787Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba017d79-c55f-44bd-bb7a-c63e551faa5d/export"/>
    <published>2026-04-30T04:07:08.308787+00:00</published>
  </entry>
</feed>
