<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T09:09:23.897099+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d17b9c59-972b-44dd-9bf2-90baaa808284/export</id>
    <title>d17b9c59-972b-44dd-9bf2-90baaa808284</title>
    <updated>2026-05-09T09:09:23.931633+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d17b9c59-972b-44dd-9bf2-90baaa808284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33230", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhjpqabgms27", "content": "", "creation_timestamp": "2026-03-20T23:55:45.982718Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d17b9c59-972b-44dd-9bf2-90baaa808284/export"/>
    <published>2026-03-20T23:55:45.982718+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/57770692-13c9-4739-ad58-48d9510257c0/export</id>
    <title>57770692-13c9-4739-ad58-48d9510257c0</title>
    <updated>2026-05-09T09:09:23.931545+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "57770692-13c9-4739-ad58-48d9510257c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhjqijr6hk2y", "content": "", "creation_timestamp": "2026-03-21T00:09:21.013585Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/57770692-13c9-4739-ad58-48d9510257c0/export"/>
    <published>2026-03-21T00:09:21.013585+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f511b4fa-9709-4ea8-ac4d-99d8b9838a77/export</id>
    <title>f511b4fa-9709-4ea8-ac4d-99d8b9838a77</title>
    <updated>2026-05-09T09:09:23.931468+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f511b4fa-9709-4ea8-ac4d-99d8b9838a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhr5zqbnjb2z", "content": "", "creation_timestamp": "2026-03-23T23:00:15.137442Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f511b4fa-9709-4ea8-ac4d-99d8b9838a77/export"/>
    <published>2026-03-23T23:00:15.137442+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5966273-240d-4a9c-9ed1-ad7c05690be2/export</id>
    <title>e5966273-240d-4a9c-9ed1-ad7c05690be2</title>
    <updated>2026-05-09T09:09:23.931383+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5966273-240d-4a9c-9ed1-ad7c05690be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33231", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrno7wulx2s", "content": "", "creation_timestamp": "2026-03-24T03:40:08.955324Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5966273-240d-4a9c-9ed1-ad7c05690be2/export"/>
    <published>2026-03-24T03:40:08.955324+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47b3dcd4-d195-4997-9cb6-2d0162d0f32b/export</id>
    <title>47b3dcd4-d195-4997-9cb6-2d0162d0f32b</title>
    <updated>2026-05-09T09:09:23.931300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "47b3dcd4-d195-4997-9cb6-2d0162d0f32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3mhsv3cjwzc2u", "content": "", "creation_timestamp": "2026-03-24T15:25:23.596977Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47b3dcd4-d195-4997-9cb6-2d0162d0f32b/export"/>
    <published>2026-03-24T15:25:23.596977+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7884e0ac-590c-41a2-9ee5-f472914b4f7d/export</id>
    <title>7884e0ac-590c-41a2-9ee5-f472914b4f7d</title>
    <updated>2026-05-09T09:09:23.931211+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7884e0ac-590c-41a2-9ee5-f472914b4f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116447714191251575", "content": "", "creation_timestamp": "2026-04-22T09:45:08.266107Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7884e0ac-590c-41a2-9ee5-f472914b4f7d/export"/>
    <published>2026-04-22T09:45:08.266107+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39/export</id>
    <title>cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39</title>
    <updated>2026-05-09T09:09:23.931109+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkl2oanfoq2o", "content": "", "creation_timestamp": "2026-04-28T16:59:45.075780Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39/export"/>
    <published>2026-04-28T16:59:45.075780+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a/export</id>
    <title>11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a</title>
    <updated>2026-05-09T09:09:23.931007+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515405426636916", "content": "#OT #Advisory VDE-2026-046VEGA: Unsecured Configuration Interface Allows Unauthorized Access Leading to Privilege Escalation\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-046/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-046.json", "creation_timestamp": "2026-05-04T08:39:55.202627Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a/export"/>
    <published>2026-05-04T08:39:55.202627+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e877fa86-fd06-443a-8b09-4bc4ec7bef6a/export</id>
    <title>e877fa86-fd06-443a-8b09-4bc4ec7bef6a</title>
    <updated>2026-05-09T09:09:23.930875+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e877fa86-fd06-443a-8b09-4bc4ec7bef6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515534446133473", "content": "#OT #Advisory VDE-2026-047VEGA: Missing Authentication for critical function in VEGAPULS Air products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-047/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-047.json", "creation_timestamp": "2026-05-04T09:12:43.127078Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e877fa86-fd06-443a-8b09-4bc4ec7bef6a/export"/>
    <published>2026-05-04T09:12:43.127078+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d292fe1c-b3b8-4d88-984d-aaa3680c92ff/export</id>
    <title>d292fe1c-b3b8-4d88-984d-aaa3680c92ff</title>
    <updated>2026-05-09T09:09:23.929108+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d292fe1c-b3b8-4d88-984d-aaa3680c92ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515547941636846", "content": "#OT #Advisory VDE-2026-048VEGA: Missing Authentication for critical function in VEGAPULS Bluetooth products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-048/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-048.json", "creation_timestamp": "2026-05-04T09:16:09.070432Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d292fe1c-b3b8-4d88-984d-aaa3680c92ff/export"/>
    <published>2026-05-04T09:16:09.070432+00:00</published>
  </entry>
</feed>
