<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T20:32:17.848457+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/63d2047c-52bf-48a5-95b9-2a5e6ac84878/export</id>
    <title>63d2047c-52bf-48a5-95b9-2a5e6ac84878</title>
    <updated>2026-05-10T20:32:17.861689+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "63d2047c-52bf-48a5-95b9-2a5e6ac84878", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkgxn7nauk2d", "content": "", "creation_timestamp": "2026-04-27T01:54:50.421621Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/63d2047c-52bf-48a5-95b9-2a5e6ac84878/export"/>
    <published>2026-04-27T01:54:50.421621+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/311285e8-9b24-483e-8c5e-6d5e07f66788/export</id>
    <title>311285e8-9b24-483e-8c5e-6d5e07f66788</title>
    <updated>2026-05-10T20:32:17.861581+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "311285e8-9b24-483e-8c5e-6d5e07f66788", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "https://bsky.app/profile/patrickcmiller.bsky.social/post/3mkksxzhtky2o", "content": "", "creation_timestamp": "2026-04-28T14:42:06.111782Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/311285e8-9b24-483e-8c5e-6d5e07f66788/export"/>
    <published>2026-04-28T14:42:06.111782+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e6ae25b8-e3e1-4ee4-9dce-deca63b5c816/export</id>
    <title>e6ae25b8-e3e1-4ee4-9dce-deca63b5c816</title>
    <updated>2026-05-10T20:32:17.861487+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e6ae25b8-e3e1-4ee4-9dce-deca63b5c816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-3844", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/116485096788734609", "content": "", "creation_timestamp": "2026-04-29T00:12:01.775202Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e6ae25b8-e3e1-4ee4-9dce-deca63b5c816/export"/>
    <published>2026-04-29T00:12:01.775202+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d3e66a7d-e357-4ca8-82d4-dfa022b4a011/export</id>
    <title>d3e66a7d-e357-4ca8-82d4-dfa022b4a011</title>
    <updated>2026-05-10T20:32:17.861396+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d3e66a7d-e357-4ca8-82d4-dfa022b4a011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "Telegram/3tKSA63ykFsNCx7Ci_YM-GlAoFttSrYjQJCM_fsQcGoJpDo", "content": "", "creation_timestamp": "2026-04-30T15:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d3e66a7d-e357-4ca8-82d4-dfa022b4a011/export"/>
    <published>2026-04-30T15:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b3cb25ea-9f37-4778-9ff8-5bc5b3301dce/export</id>
    <title>b3cb25ea-9f37-4778-9ff8-5bc5b3301dce</title>
    <updated>2026-05-10T20:32:17.861316+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b3cb25ea-9f37-4778-9ff8-5bc5b3301dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "Telegram/k5OTU-9lUzFKUTq8zqq2Ea-jY-aJMqpZsl5nZtaT5jx_Wu8", "content": "", "creation_timestamp": "2026-04-30T15:00:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b3cb25ea-9f37-4778-9ff8-5bc5b3301dce/export"/>
    <published>2026-04-30T15:00:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90461827-e6c2-4290-b059-6a5f61a9db64/export</id>
    <title>90461827-e6c2-4290-b059-6a5f61a9db64</title>
    <updated>2026-05-10T20:32:17.861220+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90461827-e6c2-4290-b059-6a5f61a9db64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "https://bsky.app/profile/donwebmedia.bsky.social/post/3ml5vbl6bhu2s", "content": "CVE-2026-3844: Breeze Cache bajo ataque activo\n\n\u00bfTen\u00e9s Breeze Cache instalado? La vulnerabilidad CVE-2026-3844 (CVSS 9.8) permite subir archivos PHP sin autenticaci\u00f3n. Actualiz\u00e1 a 2.4.5 ahora.\n\n#breezecache #cve20263844 #wordpressplugins #rce #seguridadwordpress", "creation_timestamp": "2026-05-06T04:43:46.351774Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90461827-e6c2-4290-b059-6a5f61a9db64/export"/>
    <published>2026-05-06T04:43:46.351774+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/81fa7ebe-6e2d-4bd4-80a9-ab359e4a87e3/export</id>
    <title>81fa7ebe-6e2d-4bd4-80a9-ab359e4a87e3</title>
    <updated>2026-05-10T20:32:17.861114+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "81fa7ebe-6e2d-4bd4-80a9-ab359e4a87e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "https://bsky.app/profile/mysites.guru/post/3ml6m2lxqk32n", "content": "Active exploitation of Breeze Cache (CVE-2026-3844): unauth RCE on the default WordPress cache plugin for 400,000+ Cloudways sites. Patched in 2.4.5.\n\nmysites.guru/blog/breeze-...", "creation_timestamp": "2026-05-06T11:31:28.435038Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/81fa7ebe-6e2d-4bd4-80a9-ab359e4a87e3/export"/>
    <published>2026-05-06T11:31:28.435038+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a882dc5a-08bd-434e-97be-d8f41220ee8c/export</id>
    <title>a882dc5a-08bd-434e-97be-d8f41220ee8c</title>
    <updated>2026-05-10T20:32:17.861019+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a882dc5a-08bd-434e-97be-d8f41220ee8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "https://bsky.app/profile/mysites.guru/post/3mlb4ebplbn2m", "content": "ICYMI: Active exploitation of Breeze Cache (CVE-2026-3844): unauth RCE on the default WordPress cache plugin for 400,000+ Cloudways sites. Patched in 2.4.5.\n\nmysites.guru/blog/breeze-...", "creation_timestamp": "2026-05-07T11:28:32.545668Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a882dc5a-08bd-434e-97be-d8f41220ee8c/export"/>
    <published>2026-05-07T11:28:32.545668+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e268f169-129d-4400-a0b5-50da0c84d7be/export</id>
    <title>e268f169-129d-4400-a0b5-50da0c84d7be</title>
    <updated>2026-05-10T20:32:17.860885+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e268f169-129d-4400-a0b5-50da0c84d7be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "seen", "source": "Telegram/vzTACITSxs978bepVF2fAbJ-LA46ia7V8AwPJb289jK3goA", "content": "", "creation_timestamp": "2026-05-07T21:00:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e268f169-129d-4400-a0b5-50da0c84d7be/export"/>
    <published>2026-05-07T21:00:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/afe1ab50-eb8b-4c5a-99f7-b6699d14e394/export</id>
    <title>afe1ab50-eb8b-4c5a-99f7-b6699d14e394</title>
    <updated>2026-05-10T20:32:17.859377+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "afe1ab50-eb8b-4c5a-99f7-b6699d14e394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3844", "type": "published-proof-of-concept", "source": "Telegram/eNyXP0VFcQtqPlK-8vkGtqhnCSC85Z7lTOQp_rxjHxWaPHc", "content": "", "creation_timestamp": "2026-05-08T15:00:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/afe1ab50-eb8b-4c5a-99f7-b6699d14e394/export"/>
    <published>2026-05-08T15:00:13+00:00</published>
  </entry>
</feed>
