<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T02:46:27.395134+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fbed30c7-aa3c-4329-85e4-3707720249cb/export</id>
    <title>fbed30c7-aa3c-4329-85e4-3707720249cb</title>
    <updated>2026-05-09T02:46:27.780496+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fbed30c7-aa3c-4329-85e4-3707720249cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33593", "type": "seen", "source": "Telegram/QeC7MO7ScSSiOVGXLKN0WnA843zzLxkQwsFJUKCqjpspjuY", "content": "", "creation_timestamp": "2026-04-22T15:17:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fbed30c7-aa3c-4329-85e4-3707720249cb/export"/>
    <published>2026-04-22T15:17:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ccf03284-4665-4a34-a385-395aec8c4c52/export</id>
    <title>ccf03284-4665-4a34-a385-395aec8c4c52</title>
    <updated>2026-05-09T02:46:27.780412+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ccf03284-4665-4a34-a385-395aec8c4c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33593", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mk4c5yqvhb2l", "content": "", "creation_timestamp": "2026-04-22T20:03:54.324489Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ccf03284-4665-4a34-a385-395aec8c4c52/export"/>
    <published>2026-04-22T20:03:54.324489+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8420aeb-c957-4829-b8e6-9ae6e6745805/export</id>
    <title>f8420aeb-c957-4829-b8e6-9ae6e6745805</title>
    <updated>2026-05-09T02:46:27.780322+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8420aeb-c957-4829-b8e6-9ae6e6745805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3359", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3yjbghkb27", "content": "WordPress\u30d7\u30e9\u30b0\u30a4\u30f3\u300cForm Maker by 10Web\u300d1.15.42\u4ee5\u524d\u3067\u3001SQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u3002\u653b\u6483\u8005\u306f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u304b\u3089\u6a5f\u5bc6\u60c5\u5831\u3092\u4e0d\u6b63\u306b\u53d6\u5f97\u3067\u304d\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-3359 CVSS 7.5 | HIGH", "creation_timestamp": "2026-05-05T10:36:28.992440Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8420aeb-c957-4829-b8e6-9ae6e6745805/export"/>
    <published>2026-05-05T10:36:28.992440+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3cf78729-cd78-4c70-b096-30aa69342cf0/export</id>
    <title>3cf78729-cd78-4c70-b096-30aa69342cf0</title>
    <updated>2026-05-09T02:46:27.780218+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3cf78729-cd78-4c70-b096-30aa69342cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3359", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml422qsgql2c", "content": "CVE-2026-3359 - Form Maker by 10Web \u2013 Mobile-Friendly Drag &amp;amp; Drop Contact Form Builder\nCVE ID : CVE-2026-3359\n \n Published : May 5, 2026, 7:42 a.m. | 53\u00a0minutes ago\n \n Description : The Form Maker by 10Web \u2013 Mobile-Friendly Drag &amp;amp; Drop Contact Form Builder plugin for WordP...", "creation_timestamp": "2026-05-05T11:04:06.687794Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3cf78729-cd78-4c70-b096-30aa69342cf0/export"/>
    <published>2026-05-05T11:04:06.687794+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/144342e8-55c4-4ab7-ac40-fd786caf7052/export</id>
    <title>144342e8-55c4-4ab7-ac40-fd786caf7052</title>
    <updated>2026-05-09T02:46:27.780082+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "144342e8-55c4-4ab7-ac40-fd786caf7052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3359", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml4vbadouw26", "content": "\ud83d\udfe0 CVE-2026-3359 - High (7.5)\n\nThe Form Maker by 10Web \u2013 Mobile-Friendly Drag &amp;amp; Drop Contact Form Builder plugin for WordPress...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-3359/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-05T19:10:55.595234Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/144342e8-55c4-4ab7-ac40-fd786caf7052/export"/>
    <published>2026-05-05T19:10:55.595234+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7fbdba3e-60a4-419d-b1b5-0b0e3e9f1bdd/export</id>
    <title>7fbdba3e-60a4-419d-b1b5-0b0e3e9f1bdd</title>
    <updated>2026-05-09T02:46:27.777970+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7fbdba3e-60a4-419d-b1b5-0b0e3e9f1bdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3359", "type": "seen", "source": "https://bsky.app/profile/donwebmedia.bsky.social/post/3ml5d7yvx2m2s", "content": "CVE-2026-3359: SQL Injection en Form Maker sin auth\n\nCVE-2026-3359 es una SQL Injection sin autenticaci\u00f3n en Form Maker by 10Web (hasta v1.15.42). Actualiz\u00e1 ya y proteg\u00e9 tu base de datos WordPress.\n\n#cve20263359 #sqlinjection #formmaker10web #wordpressvulnerabilidad", "creation_timestamp": "2026-05-05T23:20:46.432906Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7fbdba3e-60a4-419d-b1b5-0b0e3e9f1bdd/export"/>
    <published>2026-05-05T23:20:46.432906+00:00</published>
  </entry>
</feed>
