<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T15:12:08.844425+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b817de7b-aaa1-44cb-a8ef-fd6049b78547/export</id>
    <title>b817de7b-aaa1-44cb-a8ef-fd6049b78547</title>
    <updated>2026-05-09T15:12:08.854740+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "b817de7b-aaa1-44cb-a8ef-fd6049b78547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-authentication-bypass-moveit-automation-cve-2026-4670-patch-immediately", "content": "", "creation_timestamp": "2026-05-04T08:08:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b817de7b-aaa1-44cb-a8ef-fd6049b78547/export"/>
    <published>2026-05-04T08:08:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0387d9a0-bfbe-428a-a2f1-f7e53deb4b77/export</id>
    <title>0387d9a0-bfbe-428a-a2f1-f7e53deb4b77</title>
    <updated>2026-05-09T15:12:08.854652+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0387d9a0-bfbe-428a-a2f1-f7e53deb4b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml27bvuujh2b", "content": "Progress Software issued a critical alert regarding two severe vulnerabilities in its MOVEit Automation platform, allowing authentication bypass and privilege escalation. CVE-2026-4670 enables unauthenticated access, while CVE-2026-5174 allows attackers to gain administrative rights.", "creation_timestamp": "2026-05-04T17:32:16.791290Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0387d9a0-bfbe-428a-a2f1-f7e53deb4b77/export"/>
    <published>2026-05-04T17:32:16.791290+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e7f91d3-0dde-4491-9a19-c039d468119b/export</id>
    <title>5e7f91d3-0dde-4491-9a19-c039d468119b</title>
    <updated>2026-05-09T15:12:08.854511+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5e7f91d3-0dde-4491-9a19-c039d468119b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2f27kjle2s", "content": "Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions &amp;lt;=2025.1.4. #MOVEit #Airbus #Vulnerability", "creation_timestamp": "2026-05-04T19:15:20.825862Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e7f91d3-0dde-4491-9a19-c039d468119b/export"/>
    <published>2026-05-04T19:15:20.825862+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb33228c-ccbb-4923-8fb0-6740763aea64/export</id>
    <title>eb33228c-ccbb-4923-8fb0-6740763aea64</title>
    <updated>2026-05-09T15:12:08.854421+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb33228c-ccbb-4923-8fb0-6740763aea64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2pf3ek4p52", "content": "MOVEit automation flaws could enable full system compromise Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access...\n\n#Breaking #News #Security #CVE-2026-4670 #CVE-2026-5174 #Hacking #hacking #news #information [\u2026]", "creation_timestamp": "2026-05-04T22:20:50.087595Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb33228c-ccbb-4923-8fb0-6740763aea64/export"/>
    <published>2026-05-04T22:20:50.087595+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f740a4b-3351-45bd-b144-336e4acfb1e7/export</id>
    <title>1f740a4b-3351-45bd-b144-336e4acfb1e7</title>
    <updated>2026-05-09T15:12:08.854325+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f740a4b-3351-45bd-b144-336e4acfb1e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml4fuifrss2e", "content": "\ud83d\udd17 CVE : CVE-2026-4670, CVE-2026-4670, CVE-2026-5174", "creation_timestamp": "2026-05-05T14:35:23.790204Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f740a4b-3351-45bd-b144-336e4acfb1e7/export"/>
    <published>2026-05-05T14:35:23.790204+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8/export</id>
    <title>4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8</title>
    <updated>2026-05-09T15:12:08.854238+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/groovysecurity.bsky.social/post/3ml4j7gaprw2q", "content": "MOVEit Automation patched yesterday \u2014 CVE-2026-4670 + CVE-2026-5174, pre-auth chain to admin.\n\nTwo months back, cPanel CVE-2026-41940: 40K servers exploited from Feb 23, patch April 30.\n\nA version banner says \"remediated.\" Whether the exploit still runs on your config is a different question.", "creation_timestamp": "2026-05-05T15:35:10.080694Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8/export"/>
    <published>2026-05-05T15:35:10.080694+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dfaec400-5903-497f-a64b-e9d8361423e9/export</id>
    <title>dfaec400-5903-497f-a64b-e9d8361423e9</title>
    <updated>2026-05-09T15:12:08.854145+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dfaec400-5903-497f-a64b-e9d8361423e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3ml4mf5zt5d25", "content": "Critical vulnerabilities in MOVEit Automation (CVE-2026-4670 &amp;amp; CVE-2026-5174) demand immediate patching to prevent unauthorized access and privilege escalation. #CyberSecurity #DataProtection #MOVEit Link: thedailytechfeed.com/critical-mov...", "creation_timestamp": "2026-05-05T16:32:04.225951Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dfaec400-5903-497f-a64b-e9d8361423e9/export"/>
    <published>2026-05-05T16:32:04.225951+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/799d8809-c500-4b3c-bbb3-54fca2c7bc16/export</id>
    <title>799d8809-c500-4b3c-bbb3-54fca2c7bc16</title>
    <updated>2026-05-09T15:12:08.854021+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "799d8809-c500-4b3c-bbb3-54fca2c7bc16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml5xk5vwpq2w", "content": "Critical 98 MOVEit Automation Flaw Opens Enterprise File Transfer Systems to Unauthenticated Takeover +\u00a0Video\n\nIntroduction: A critical authentication bypass vulnerability (CVE-2026-4670, CVSS 9.8) and a high-severity privilege escalation flaw (CVE-2026-5174, CVSS 7.7) have been disclosed in\u2026", "creation_timestamp": "2026-05-06T05:24:22.185250Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/799d8809-c500-4b3c-bbb3-54fca2c7bc16/export"/>
    <published>2026-05-06T05:24:22.185250+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8ce6f374-9e98-47d1-93d7-792bb794c6fa/export</id>
    <title>8ce6f374-9e98-47d1-93d7-792bb794c6fa</title>
    <updated>2026-05-09T15:12:08.852970+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8ce6f374-9e98-47d1-93d7-792bb794c6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0133", "content": "Progress heeft kwetsbaarheden verholpen in MOVEit Automation. De kwetsbaarheid met kenmerk CVE-2026-4670 betreft een bypass van de authenticatie in MOVEit Automation. Een kwaadwillende zonder rechten kan deze kwetsbaarheid misbruiken zonder dat daar gebruikersinteractie voor nodig is. \n\nDe tweede kwetsbaarheid met kenmerk CVE-2026-5174 betreft een onjuiste invoervalidatie in Progress Software MOVEit Automation en maakt privilege-escalatie mogelijk.\n\nDeze kwetsbaarheden zijn aanwezig in versies 2025.0.0 tot maar niet inclusief 2025.0.9, versies 2024.0.0 tot maar niet inclusief 2024.1.8, en alle versies v\u00f3\u00f3r 2024.0.0.", "creation_timestamp": "2026-05-06T07:18:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8ce6f374-9e98-47d1-93d7-792bb794c6fa/export"/>
    <published>2026-05-06T07:18:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f49234f9-b5cb-4bd7-9f20-38141a530260/export</id>
    <title>f49234f9-b5cb-4bd7-9f20-38141a530260</title>
    <updated>2026-05-09T15:12:08.851394+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "f49234f9-b5cb-4bd7-9f20-38141a530260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://www.cert.se/2026/05/cert-se-veckobrev-v19.html", "content": "", "creation_timestamp": "2026-05-08T06:10:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f49234f9-b5cb-4bd7-9f20-38141a530260/export"/>
    <published>2026-05-08T06:10:00+00:00</published>
  </entry>
</feed>
