<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T15:05:00.906679+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b8beec00-1981-48e2-95c1-834d84571a8f/export</id>
    <title>b8beec00-1981-48e2-95c1-834d84571a8f</title>
    <updated>2026-05-09T15:05:00.917836+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b8beec00-1981-48e2-95c1-834d84571a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "Telegram/ejAET7Wd0n1V5uqKctP5d-vJmqb8O4j5F4lTKyPXLyKbJrU", "content": "", "creation_timestamp": "2026-05-06T03:00:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b8beec00-1981-48e2-95c1-834d84571a8f/export"/>
    <published>2026-05-06T03:00:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2001e0c0-705c-4340-830c-6410af5f0af7/export</id>
    <title>2001e0c0-705c-4340-830c-6410af5f0af7</title>
    <updated>2026-05-09T15:05:00.915903+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://cve.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "2001e0c0-705c-4340-830c-6410af5f0af7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "https://vulnerability.circl.lu/comment/f6d41719-7e76-40c7-ac12-d7d70f2ac1db", "content": "", "creation_timestamp": "2026-05-06T06:28:08.637328Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2001e0c0-705c-4340-830c-6410af5f0af7/export"/>
    <published>2026-05-06T06:28:08.637328+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bf82573e-58b1-4c87-b444-c0f115e345b6/export</id>
    <title>bf82573e-58b1-4c87-b444-c0f115e345b6</title>
    <updated>2026-05-09T15:05:00.915822+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bf82573e-58b1-4c87-b444-c0f115e345b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3ml6b4hby722o", "content": "Critical Remote Memory Leak Vulnerability in Ollama (CVE-2026-7482) #appsec", "creation_timestamp": "2026-05-06T08:15:39.284615Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bf82573e-58b1-4c87-b444-c0f115e345b6/export"/>
    <published>2026-05-06T08:15:39.284615+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4dd0b4de-4396-4895-a184-2339102d1cc6/export</id>
    <title>4dd0b4de-4396-4895-a184-2339102d1cc6</title>
    <updated>2026-05-09T15:05:00.915738+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4dd0b4de-4396-4895-a184-2339102d1cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml72eahjro2g", "content": "Regulatory actions hit Kochava over location data and privacy settlements impact Forbes. Data exposures found in Vimeo and Canvas. Critical flaws like Bleeding Llama (CVE-2026-7482) and MOVEit exploited amid active threat groups. #DataPrivacy #US", "creation_timestamp": "2026-05-06T15:47:24.700122Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4dd0b4de-4396-4895-a184-2339102d1cc6/export"/>
    <published>2026-05-06T15:47:24.700122+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a2107ca-181b-4d2d-b985-b81b249f9e47/export</id>
    <title>8a2107ca-181b-4d2d-b985-b81b249f9e47</title>
    <updated>2026-05-09T15:05:00.915652+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a2107ca-181b-4d2d-b985-b81b249f9e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ml735pisvl2l", "content": "[RSS] Bleeding Llama: Critical Unauthenticated Memory Leak in Ollama (CVE-2026-7482)\n\n\n www.cyera.com -&amp;gt; \n\n\nOriginal-&amp;gt;", "creation_timestamp": "2026-05-06T16:01:38.938807Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a2107ca-181b-4d2d-b985-b81b249f9e47/export"/>
    <published>2026-05-06T16:01:38.938807+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bf528cfa-b26e-4c8d-9ac2-00882c078f5d/export</id>
    <title>bf528cfa-b26e-4c8d-9ac2-00882c078f5d</title>
    <updated>2026-05-09T15:05:00.915566+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bf528cfa-b26e-4c8d-9ac2-00882c078f5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7482", "type": "seen", "source": "https://infosec.exchange/ap/users/115741367687413652/statuses/116528836896778217", "content": "Another AI service that's dangerous when exposed to the internet? Well I never!\nAnyway go check for exposed Ollama endpoints.\nhttps://discourse.ifin.network/t/unauthenticated-memory-leak-in-ollama-cve-2026-7482/389\n#CVE #ThreatIntel #ThreatIntelligence #IFIN", "creation_timestamp": "2026-05-06T17:46:30.794966Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bf528cfa-b26e-4c8d-9ac2-00882c078f5d/export"/>
    <published>2026-05-06T17:46:30.794966+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e31bc027-500a-4a86-acc4-fb0b3bb1f31d/export</id>
    <title>e31bc027-500a-4a86-acc4-fb0b3bb1f31d</title>
    <updated>2026-05-09T15:05:00.915470+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e31bc027-500a-4a86-acc4-fb0b3bb1f31d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "https://bsky.app/profile/lalgorisme.bsky.social/post/3mlatqjeszc2e", "content": "Una vulnerabilitat al GGUF, el format obert que empaqueta models d'IA en un sol fitxer i que Ollama utilitza, exposa prompts, missatges i variables d'entorn d'unes 300.000 inst\u00e0ncies exposades a internet. Puntuaci\u00f3 9.3/10 (CVE-2026-7482).\nwww.securityweek.com/critical-bug...", "creation_timestamp": "2026-05-07T08:54:25.681908Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e31bc027-500a-4a86-acc4-fb0b3bb1f31d/export"/>
    <published>2026-05-07T08:54:25.681908+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e4b608d7-588f-4ea0-9d18-2016b7895907/export</id>
    <title>e4b608d7-588f-4ea0-9d18-2016b7895907</title>
    <updated>2026-05-09T15:05:00.915366+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e4b608d7-588f-4ea0-9d18-2016b7895907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "Telegram/PzhmRpnH0GK_l-gQSVtV4RydjOIkDAHQ-MCr1tu85IjwQYE", "content": "", "creation_timestamp": "2026-05-07T19:00:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e4b608d7-588f-4ea0-9d18-2016b7895907/export"/>
    <published>2026-05-07T19:00:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fe1affa-31fd-4a95-9ac7-bdfa7b15a418/export</id>
    <title>5fe1affa-31fd-4a95-9ac7-bdfa7b15a418</title>
    <updated>2026-05-09T15:05:00.915222+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fe1affa-31fd-4a95-9ac7-bdfa7b15a418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7482", "type": "seen", "source": "Telegram/vzTACITSxs978bepVF2fAbJ-LA46ia7V8AwPJb289jK3goA", "content": "", "creation_timestamp": "2026-05-07T21:00:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fe1affa-31fd-4a95-9ac7-bdfa7b15a418/export"/>
    <published>2026-05-07T21:00:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/09f13d38-0493-40a2-9c08-4c022e89fb8a/export</id>
    <title>09f13d38-0493-40a2-9c08-4c022e89fb8a</title>
    <updated>2026-05-09T15:05:00.913007+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "09f13d38-0493-40a2-9c08-4c022e89fb8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7482", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3mle2dd736d23", "content": "\ud83d\udce2 CVE-2026-7482 : Fuite m\u00e9moire critique non authentifi\u00e9e dans Ollama (Bleeding Llama)\n\ud83d\udcdd ## \ud83d\udd0d Contexte\n\nPubli\u00e9 le 5 mai 2026 par Dor Attias de Cyera \u2026\nhttps://cyberveille.ch/posts/2026-05-08-cve-2026-7482-fuite-memoire-critique-non-authentifiee-dans-ollama-bleeding-llama/ #CVE_2026_7482 #Cyberveille", "creation_timestamp": "2026-05-08T15:30:12.330870Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/09f13d38-0493-40a2-9c08-4c022e89fb8a/export"/>
    <published>2026-05-08T15:30:12.330870+00:00</published>
  </entry>
</feed>
