<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T16:36:02.733463+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb5ec63a-559d-432e-915b-dab45974a3b2/export</id>
    <title>eb5ec63a-559d-432e-915b-dab45974a3b2</title>
    <updated>2026-05-09T16:36:03.070004+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb5ec63a-559d-432e-915b-dab45974a3b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40066", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-03", "content": "", "creation_timestamp": "2026-04-16T10:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb5ec63a-559d-432e-915b-dab45974a3b2/export"/>
    <published>2026-04-16T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8cd7c081-7b73-4693-bb18-9d2d7a8bda57/export</id>
    <title>8cd7c081-7b73-4693-bb18-9d2d7a8bda57</title>
    <updated>2026-05-09T16:36:03.069943+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8cd7c081-7b73-4693-bb18-9d2d7a8bda57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40066", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mjpszvyj4z27", "content": "", "creation_timestamp": "2026-04-17T21:01:14.128436Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8cd7c081-7b73-4693-bb18-9d2d7a8bda57/export"/>
    <published>2026-04-17T21:01:14.128436+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a6275a7-5c7d-4cae-abf4-2095da9a0a81/export</id>
    <title>4a6275a7-5c7d-4cae-abf4-2095da9a0a81</title>
    <updated>2026-05-09T16:36:03.069877+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a6275a7-5c7d-4cae-abf4-2095da9a0a81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40066", "type": "seen", "source": "Telegram/Q64crjFZRAFhidSIvAgPD7j9KS4Pns0gYZhyfeiZ9MDp9II", "content": "", "creation_timestamp": "2026-04-17T21:23:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a6275a7-5c7d-4cae-abf4-2095da9a0a81/export"/>
    <published>2026-04-17T21:23:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad4cc7d6-ba99-4dee-bac5-8dcee382645f/export</id>
    <title>ad4cc7d6-ba99-4dee-bac5-8dcee382645f</title>
    <updated>2026-05-09T16:36:03.069780+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad4cc7d6-ba99-4dee-bac5-8dcee382645f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40066", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjq2i4lbjy2r", "content": "", "creation_timestamp": "2026-04-17T23:14:26.435435Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad4cc7d6-ba99-4dee-bac5-8dcee382645f/export"/>
    <published>2026-04-17T23:14:26.435435+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/316d400b-fa18-44f3-a83b-4798fc575dbb/export</id>
    <title>316d400b-fa18-44f3-a83b-4798fc575dbb</title>
    <updated>2026-05-09T16:36:03.068385+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "316d400b-fa18-44f3-a83b-4798fc575dbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40066", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkzytzy6qb2p", "content": "\ud83d\udccc CVE-2026-40066 - Anviz\u00a0CX2 Lite and CX7\u00a0are vulnerable to unverified update packages that can be uploaded. The \ndevice unpacks and executes a script resulting in unaut... https://www.cyberhub.blog/cves/CVE-2026-40066", "creation_timestamp": "2026-05-04T15:37:07.756986Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/316d400b-fa18-44f3-a83b-4798fc575dbb/export"/>
    <published>2026-05-04T15:37:07.756986+00:00</published>
  </entry>
</feed>
