<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T16:35:46.736457+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e67f1c80-dbbd-4319-9805-2b39d18c7319/export</id>
    <title>e67f1c80-dbbd-4319-9805-2b39d18c7319</title>
    <updated>2026-05-10T16:35:47.120568+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e67f1c80-dbbd-4319-9805-2b39d18c7319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42072", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlealona2526", "content": "\ud83d\udd34 CVE-2026-42072 - Critical (9.8)\n\nNornicdb is a distributed low-latency, Graph+Vector, Temporal MVCC with all sub-ms HNSW search, g...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42072/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T17:22:15.165295Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e67f1c80-dbbd-4319-9805-2b39d18c7319/export"/>
    <published>2026-05-08T17:22:15.165295+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa4107f1-a8ce-4b0e-ac36-63cac8372bae/export</id>
    <title>fa4107f1-a8ce-4b0e-ac36-63cac8372bae</title>
    <updated>2026-05-10T16:35:47.120397+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa4107f1-a8ce-4b0e-ac36-63cac8372bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42072", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mleem5x72k2v", "content": "CVE-2026-42072 - Nornicdb: Improper Network Binding in NornicDB Bolt Server allows unauthorized remote access\nCVE ID : CVE-2026-42072\n \n Published : May 8, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Nornicdb is a distributed low-latency, Graph+Vector, Temporal MV...", "creation_timestamp": "2026-05-08T18:34:05.872931Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa4107f1-a8ce-4b0e-ac36-63cac8372bae/export"/>
    <published>2026-05-08T18:34:05.872931+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7fb8de08-be07-492a-ac85-c119f3619aa8/export</id>
    <title>7fb8de08-be07-492a-ac85-c119f3619aa8</title>
    <updated>2026-05-10T16:35:47.120189+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7fb8de08-be07-492a-ac85-c119f3619aa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42072", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116544151733422821", "content": "\u26a0\ufe0f CRITICAL: orneryd NornicDB (&amp;lt;1.0.42-hotfix) exposes Bolt server on all LAN interfaces with default admin creds (admin:password). Full DB compromise possible! Upgrade to 1.0.42-hotfix now. CVE-2026-42072 https://radar.offseq.com/threat/cve-2026-42072-cwe-1392-use-of-default-credentials-cb1c5acf #OffSeq #CVE202642072 #infosec", "creation_timestamp": "2026-05-09T10:30:28.544883Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7fb8de08-be07-492a-ac85-c119f3619aa8/export"/>
    <published>2026-05-09T10:30:28.544883+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4cdb49b2-9104-4bc6-a456-b2a7a5222d04/export</id>
    <title>4cdb49b2-9104-4bc6-a456-b2a7a5222d04</title>
    <updated>2026-05-10T16:35:47.117605+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4cdb49b2-9104-4bc6-a456-b2a7a5222d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42072", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mlg22dseio2y", "content": "NornicDB (&amp;lt;1.0.42-hotfix) critical vuln: Bolt server exposed on LAN with default admin creds. Upgrade to 1.0.42-hotfix ASAP to prevent DB compromise! \ud83d\udea8 https://radar.offseq.com/threat/cve-2026-42072-cwe-1392-use-of-default-credentials-cb1c5acf #OffSeq #CVE202642072", "creation_timestamp": "2026-05-09T10:30:30.417316Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4cdb49b2-9104-4bc6-a456-b2a7a5222d04/export"/>
    <published>2026-05-09T10:30:30.417316+00:00</published>
  </entry>
</feed>
