<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T06:50:07.808223+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/212271ef-70bc-4f22-9123-1b384ab697f5/export</id>
    <title>212271ef-70bc-4f22-9123-1b384ab697f5</title>
    <updated>2026-05-11T06:50:07.834910+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "212271ef-70bc-4f22-9123-1b384ab697f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4116", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mj37gjfpqt22", "content": "", "creation_timestamp": "2026-04-09T16:17:06.969900Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/212271ef-70bc-4f22-9123-1b384ab697f5/export"/>
    <published>2026-04-09T16:17:06.969900+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9f453d3-e9a8-4d69-b406-4df55988d074/export</id>
    <title>d9f453d3-e9a8-4d69-b406-4df55988d074</title>
    <updated>2026-05-11T06:50:07.834811+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9f453d3-e9a8-4d69-b406-4df55988d074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4116", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mjbzz4v5d22t", "content": "", "creation_timestamp": "2026-04-12T09:28:48.074496Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9f453d3-e9a8-4d69-b406-4df55988d074/export"/>
    <published>2026-04-12T09:28:48.074496+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fb1eb8c-f138-4dcb-af9b-2dba2a1df511/export</id>
    <title>5fb1eb8c-f138-4dcb-af9b-2dba2a1df511</title>
    <updated>2026-05-11T06:50:07.834698+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fb1eb8c-f138-4dcb-af9b-2dba2a1df511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4116", "type": "seen", "source": "Telegram/T6l_H2Tb9WgoQSprZe9qAhfyNPVN15xjvjGP6Y4-bIX71SI", "content": "", "creation_timestamp": "2026-04-13T21:22:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fb1eb8c-f138-4dcb-af9b-2dba2a1df511/export"/>
    <published>2026-04-13T21:22:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39903b03-315d-4a3e-b8b1-5397d1df1b8d/export</id>
    <title>39903b03-315d-4a3e-b8b1-5397d1df1b8d</title>
    <updated>2026-05-11T06:50:07.834596+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39903b03-315d-4a3e-b8b1-5397d1df1b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41167", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mk4gnbxyzv2q", "content": "", "creation_timestamp": "2026-04-22T21:24:02.745825Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39903b03-315d-4a3e-b8b1-5397d1df1b8d/export"/>
    <published>2026-04-22T21:24:02.745825+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/22949c67-e0d0-4de8-96b4-2e5cdff1304c/export</id>
    <title>22949c67-e0d0-4de8-96b4-2e5cdff1304c</title>
    <updated>2026-05-11T06:50:07.834494+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "22949c67-e0d0-4de8-96b4-2e5cdff1304c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-41167", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116450723807217963", "content": "", "creation_timestamp": "2026-04-22T22:30:31.884800Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/22949c67-e0d0-4de8-96b4-2e5cdff1304c/export"/>
    <published>2026-04-22T22:30:31.884800+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cdf2910d-6ca4-4304-9f51-5b835b048c54/export</id>
    <title>cdf2910d-6ca4-4304-9f51-5b835b048c54</title>
    <updated>2026-05-11T06:50:07.834391+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cdf2910d-6ca4-4304-9f51-5b835b048c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-41167", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mk4keafysm2g", "content": "", "creation_timestamp": "2026-04-22T22:30:33.345298Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cdf2910d-6ca4-4304-9f51-5b835b048c54/export"/>
    <published>2026-04-22T22:30:33.345298+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cba77c22-3cd7-4fc6-b9aa-f91877ee5a06/export</id>
    <title>cba77c22-3cd7-4fc6-b9aa-f91877ee5a06</title>
    <updated>2026-05-11T06:50:07.834283+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cba77c22-3cd7-4fc6-b9aa-f91877ee5a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41166", "type": "seen", "source": "Telegram/n2iRBZnq9E7ZcL0orkF_wrY_jYuWJ0gfdHv4rT79OW1qv3c", "content": "", "creation_timestamp": "2026-04-22T23:20:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cba77c22-3cd7-4fc6-b9aa-f91877ee5a06/export"/>
    <published>2026-04-22T23:20:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7b8d83ad-bd4e-48a6-9056-417bfdc9c893/export</id>
    <title>7b8d83ad-bd4e-48a6-9056-417bfdc9c893</title>
    <updated>2026-05-11T06:50:07.834169+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7b8d83ad-bd4e-48a6-9056-417bfdc9c893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41167", "type": "seen", "source": "Telegram/bXcnMEVg4MqmghIUy-Ivhp7SDQD9oC-u5oUbMXpQMRT1SlU", "content": "", "creation_timestamp": "2026-04-22T23:20:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7b8d83ad-bd4e-48a6-9056-417bfdc9c893/export"/>
    <published>2026-04-22T23:20:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02395206-f394-40e6-91d6-0b18a74590b3/export</id>
    <title>02395206-f394-40e6-91d6-0b18a74590b3</title>
    <updated>2026-05-11T06:50:07.834024+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02395206-f394-40e6-91d6-0b18a74590b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41163", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkcw5o2cdu2s", "content": "", "creation_timestamp": "2026-04-25T11:17:35.660181Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02395206-f394-40e6-91d6-0b18a74590b3/export"/>
    <published>2026-04-25T11:17:35.660181+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed38a4b3-54ba-4909-a7f9-45ad93d89f4f/export</id>
    <title>ed38a4b3-54ba-4909-a7f9-45ad93d89f4f</title>
    <updated>2026-05-11T06:50:07.831568+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed38a4b3-54ba-4909-a7f9-45ad93d89f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41163", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlfisnqiqh2e", "content": "CVE-2026-41163 - bubblewrap vulnerable to privilege escalation in setuid mode via ptrace\nCVE ID : CVE-2026-41163\n \n Published : May 9, 2026, 3:56 a.m. | 29\u00a0minutes ago\n \n Description : bubblewrap is a low-level unprivileged sandboxing tool. From version 0.11.0 to before versio...", "creation_timestamp": "2026-05-09T05:21:58.503625Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed38a4b3-54ba-4909-a7f9-45ad93d89f4f/export"/>
    <published>2026-05-09T05:21:58.503625+00:00</published>
  </entry>
</feed>
