<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T19:48:20.613431+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1df12cdc-b27a-4b3a-87c0-08aae29c30be/export</id>
    <title>1df12cdc-b27a-4b3a-87c0-08aae29c30be</title>
    <updated>2026-05-09T19:48:20.636694+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1df12cdc-b27a-4b3a-87c0-08aae29c30be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mj4kj7tf2k2f", "content": "", "creation_timestamp": "2026-04-10T05:08:11.024499Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1df12cdc-b27a-4b3a-87c0-08aae29c30be/export"/>
    <published>2026-04-10T05:08:11.024499+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/74ab0321-ae2c-449d-9809-e4994c0215cb/export</id>
    <title>74ab0321-ae2c-449d-9809-e4994c0215cb</title>
    <updated>2026-05-09T19:48:20.636550+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "74ab0321-ae2c-449d-9809-e4994c0215cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mj7hg4vguk2v", "content": "", "creation_timestamp": "2026-04-11T08:50:44.403495Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/74ab0321-ae2c-449d-9809-e4994c0215cb/export"/>
    <published>2026-04-11T08:50:44.403495+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/26f8b88a-f1a4-4ce7-a33d-bfb7d5682fd6/export</id>
    <title>26f8b88a-f1a4-4ce7-a33d-bfb7d5682fd6</title>
    <updated>2026-05-09T19:48:20.635471+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://cve.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "26f8b88a-f1a4-4ce7-a33d-bfb7d5682fd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20260413", "content": "", "creation_timestamp": "2026-04-12T20:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/26f8b88a-f1a4-4ce7-a33d-bfb7d5682fd6/export"/>
    <published>2026-04-12T20:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b42357ab-4e61-4a71-a08f-9e68c43791ec/export</id>
    <title>b42357ab-4e61-4a71-a08f-9e68c43791ec</title>
    <updated>2026-05-09T19:48:20.635393+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b42357ab-4e61-4a71-a08f-9e68c43791ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mjfe6ec5s22t", "content": "", "creation_timestamp": "2026-04-13T17:08:40.974205Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b42357ab-4e61-4a71-a08f-9e68c43791ec/export"/>
    <published>2026-04-13T17:08:40.974205+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5f5e1ec0-f179-47ef-b562-aa6a94bb9ed9/export</id>
    <title>5f5e1ec0-f179-47ef-b562-aa6a94bb9ed9</title>
    <updated>2026-05-09T19:48:20.635312+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5f5e1ec0-f179-47ef-b562-aa6a94bb9ed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://www.thezdi.com/blog/2026/4/14/the-april-2026-security-update-review", "content": "", "creation_timestamp": "2026-04-14T15:49:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5f5e1ec0-f179-47ef-b562-aa6a94bb9ed9/export"/>
    <published>2026-04-14T15:49:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cf747a42-4e33-4e97-84ff-7f61a5c53118/export</id>
    <title>cf747a42-4e33-4e97-84ff-7f61a5c53118</title>
    <updated>2026-05-09T19:48:20.635225+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cf747a42-4e33-4e97-84ff-7f61a5c53118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/", "content": "", "creation_timestamp": "2026-04-14T19:47:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cf747a42-4e33-4e97-84ff-7f61a5c53118/export"/>
    <published>2026-04-14T19:47:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1a9d0cf3-46bd-4796-ba4b-f6b8d4326c67/export</id>
    <title>1a9d0cf3-46bd-4796-ba4b-f6b8d4326c67</title>
    <updated>2026-05-09T19:48:20.635098+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1a9d0cf3-46bd-4796-ba4b-f6b8d4326c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://bsky.app/profile/groovysecurity.bsky.social/post/3mjmq7eu5rn2i", "content": "", "creation_timestamp": "2026-04-16T15:32:50.474176Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1a9d0cf3-46bd-4796-ba4b-f6b8d4326c67/export"/>
    <published>2026-04-16T15:32:50.474176+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/614da0a5-03e1-4331-af42-10cc0db9dc9f/export</id>
    <title>614da0a5-03e1-4331-af42-10cc0db9dc9f</title>
    <updated>2026-05-09T19:48:20.635008+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "614da0a5-03e1-4331-af42-10cc0db9dc9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "MISP/f15094ac-c6b8-4c5e-ad9f-470d4c4740d9", "content": "", "creation_timestamp": "2026-04-18T03:31:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/614da0a5-03e1-4331-af42-10cc0db9dc9f/export"/>
    <published>2026-04-18T03:31:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2bd05c94-835c-4844-9b81-5311e01ed39d/export</id>
    <title>2bd05c94-835c-4844-9b81-5311e01ed39d</title>
    <updated>2026-05-09T19:48:20.634883+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2bd05c94-835c-4844-9b81-5311e01ed39d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://bsky.app/profile/bigpoppaken.bsky.social/post/3mjxmjmzski24", "content": "", "creation_timestamp": "2026-04-20T23:26:03.577015Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2bd05c94-835c-4844-9b81-5311e01ed39d/export"/>
    <published>2026-04-20T23:26:03.577015+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3f39017e-347c-4a5e-834b-c4a2ed55e976/export</id>
    <title>3f39017e-347c-4a5e-834b-c4a2ed55e976</title>
    <updated>2026-05-09T19:48:20.633227+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3f39017e-347c-4a5e-834b-c4a2ed55e976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5281", "type": "seen", "source": "https://bsky.app/profile/kotosecurity.bsky.social/post/3mkb4bibpn52q", "content": "", "creation_timestamp": "2026-04-24T18:01:46.904997Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3f39017e-347c-4a5e-834b-c4a2ed55e976/export"/>
    <published>2026-04-24T18:01:46.904997+00:00</published>
  </entry>
</feed>
