<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T08:28:39.908928+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/80be3eea-bb4d-45ec-9d25-66594004b80b/export</id>
    <title>80be3eea-bb4d-45ec-9d25-66594004b80b</title>
    <updated>2026-05-09T08:28:40.291265+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "80be3eea-bb4d-45ec-9d25-66594004b80b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-4147", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2026-4147", "content": "", "creation_timestamp": "2026-03-17T15:16:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/80be3eea-bb4d-45ec-9d25-66594004b80b/export"/>
    <published>2026-03-17T15:16:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d28f315b-eec9-483d-bb05-c9a97f07c093/export</id>
    <title>d28f315b-eec9-483d-bb05-c9a97f07c093</title>
    <updated>2026-05-09T08:28:40.291126+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d28f315b-eec9-483d-bb05-c9a97f07c093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41478", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkbjlqme3z2n", "content": "", "creation_timestamp": "2026-04-24T22:00:10.320749Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d28f315b-eec9-483d-bb05-c9a97f07c093/export"/>
    <published>2026-04-24T22:00:10.320749+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/84a1dcbc-1d05-4f64-a828-5d558e6201da/export</id>
    <title>84a1dcbc-1d05-4f64-a828-5d558e6201da</title>
    <updated>2026-05-09T08:28:40.290987+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "84a1dcbc-1d05-4f64-a828-5d558e6201da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41476", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116464772166042640", "content": "", "creation_timestamp": "2026-04-25T10:03:12.494089Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/84a1dcbc-1d05-4f64-a828-5d558e6201da/export"/>
    <published>2026-04-25T10:03:12.494089+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/273fadb4-5c2d-4e01-b011-8383d53f3222/export</id>
    <title>273fadb4-5c2d-4e01-b011-8383d53f3222</title>
    <updated>2026-05-09T08:28:40.290850+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "273fadb4-5c2d-4e01-b011-8383d53f3222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41478", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkkxq6o5ex2w", "content": "", "creation_timestamp": "2026-04-28T16:07:09.205683Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/273fadb4-5c2d-4e01-b011-8383d53f3222/export"/>
    <published>2026-04-28T16:07:09.205683+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2723dce2-2162-43af-b24a-92afb862c725/export</id>
    <title>2723dce2-2162-43af-b24a-92afb862c725</title>
    <updated>2026-05-09T08:28:40.290695+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2723dce2-2162-43af-b24a-92afb862c725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41478", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mkkxqadlwd2y", "content": "", "creation_timestamp": "2026-04-28T16:07:10.321664Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2723dce2-2162-43af-b24a-92afb862c725/export"/>
    <published>2026-04-28T16:07:10.321664+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1e3b6f1a-ac33-44b5-9844-49d3e0eec89e/export</id>
    <title>1e3b6f1a-ac33-44b5-9844-49d3e0eec89e</title>
    <updated>2026-05-09T08:28:40.290498+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1e3b6f1a-ac33-44b5-9844-49d3e0eec89e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41471", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2c6cl7wd2e", "content": "\ud83d\udfe0 CVE-2026-41471 - High (7.5)\n\nEasy PayPal Events &amp;amp; Tickets plugin for WordPress versions 1.3 and earlier contain an information...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-41471/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T18:24:00.750906Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1e3b6f1a-ac33-44b5-9844-49d3e0eec89e/export"/>
    <published>2026-05-04T18:24:00.750906+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fbec927d-1676-44dd-aba4-db2c6ea72311/export</id>
    <title>fbec927d-1676-44dd-aba4-db2c6ea72311</title>
    <updated>2026-05-09T08:28:40.288221+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fbec927d-1676-44dd-aba4-db2c6ea72311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-41471", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2dzsfn3q2t", "content": "CVE-2026-41471 - Easy PayPal Events &amp;amp; Tickets 1.3 Information Disclosure via QR Code Endpoint\nCVE ID : CVE-2026-41471\n \n Published : May 4, 2026, 5:40 p.m. | 40\u00a0minutes ago\n \n Description : Easy PayPal Events &amp;amp; Tickets plugin for WordPress versions 1.3 and earlier contain ...", "creation_timestamp": "2026-05-04T18:57:12.229009Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fbec927d-1676-44dd-aba4-db2c6ea72311/export"/>
    <published>2026-05-04T18:57:12.229009+00:00</published>
  </entry>
</feed>
