<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 09:09:08 +0000</lastBuildDate>
    <item>
      <title>d17b9c59-972b-44dd-9bf2-90baaa808284</title>
      <link>https://vulnerability.circl.lu/sighting/d17b9c59-972b-44dd-9bf2-90baaa808284/export</link>
      <description>{"uuid": "d17b9c59-972b-44dd-9bf2-90baaa808284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33230", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhjpqabgms27", "content": "", "creation_timestamp": "2026-03-20T23:55:45.982718Z"}</description>
      <content:encoded>{"uuid": "d17b9c59-972b-44dd-9bf2-90baaa808284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33230", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhjpqabgms27", "content": "", "creation_timestamp": "2026-03-20T23:55:45.982718Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d17b9c59-972b-44dd-9bf2-90baaa808284/export</guid>
      <pubDate>Fri, 20 Mar 2026 23:55:45 +0000</pubDate>
    </item>
    <item>
      <title>57770692-13c9-4739-ad58-48d9510257c0</title>
      <link>https://vulnerability.circl.lu/sighting/57770692-13c9-4739-ad58-48d9510257c0/export</link>
      <description>{"uuid": "57770692-13c9-4739-ad58-48d9510257c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhjqijr6hk2y", "content": "", "creation_timestamp": "2026-03-21T00:09:21.013585Z"}</description>
      <content:encoded>{"uuid": "57770692-13c9-4739-ad58-48d9510257c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhjqijr6hk2y", "content": "", "creation_timestamp": "2026-03-21T00:09:21.013585Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/57770692-13c9-4739-ad58-48d9510257c0/export</guid>
      <pubDate>Sat, 21 Mar 2026 00:09:21 +0000</pubDate>
    </item>
    <item>
      <title>f511b4fa-9709-4ea8-ac4d-99d8b9838a77</title>
      <link>https://vulnerability.circl.lu/sighting/f511b4fa-9709-4ea8-ac4d-99d8b9838a77/export</link>
      <description>{"uuid": "f511b4fa-9709-4ea8-ac4d-99d8b9838a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhr5zqbnjb2z", "content": "", "creation_timestamp": "2026-03-23T23:00:15.137442Z"}</description>
      <content:encoded>{"uuid": "f511b4fa-9709-4ea8-ac4d-99d8b9838a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhr5zqbnjb2z", "content": "", "creation_timestamp": "2026-03-23T23:00:15.137442Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f511b4fa-9709-4ea8-ac4d-99d8b9838a77/export</guid>
      <pubDate>Mon, 23 Mar 2026 23:00:15 +0000</pubDate>
    </item>
    <item>
      <title>e5966273-240d-4a9c-9ed1-ad7c05690be2</title>
      <link>https://vulnerability.circl.lu/sighting/e5966273-240d-4a9c-9ed1-ad7c05690be2/export</link>
      <description>{"uuid": "e5966273-240d-4a9c-9ed1-ad7c05690be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33231", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrno7wulx2s", "content": "", "creation_timestamp": "2026-03-24T03:40:08.955324Z"}</description>
      <content:encoded>{"uuid": "e5966273-240d-4a9c-9ed1-ad7c05690be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33231", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrno7wulx2s", "content": "", "creation_timestamp": "2026-03-24T03:40:08.955324Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e5966273-240d-4a9c-9ed1-ad7c05690be2/export</guid>
      <pubDate>Tue, 24 Mar 2026 03:40:08 +0000</pubDate>
    </item>
    <item>
      <title>47b3dcd4-d195-4997-9cb6-2d0162d0f32b</title>
      <link>https://vulnerability.circl.lu/sighting/47b3dcd4-d195-4997-9cb6-2d0162d0f32b/export</link>
      <description>{"uuid": "47b3dcd4-d195-4997-9cb6-2d0162d0f32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3mhsv3cjwzc2u", "content": "", "creation_timestamp": "2026-03-24T15:25:23.596977Z"}</description>
      <content:encoded>{"uuid": "47b3dcd4-d195-4997-9cb6-2d0162d0f32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33236", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3mhsv3cjwzc2u", "content": "", "creation_timestamp": "2026-03-24T15:25:23.596977Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47b3dcd4-d195-4997-9cb6-2d0162d0f32b/export</guid>
      <pubDate>Tue, 24 Mar 2026 15:25:23 +0000</pubDate>
    </item>
    <item>
      <title>7884e0ac-590c-41a2-9ee5-f472914b4f7d</title>
      <link>https://vulnerability.circl.lu/sighting/7884e0ac-590c-41a2-9ee5-f472914b4f7d/export</link>
      <description>{"uuid": "7884e0ac-590c-41a2-9ee5-f472914b4f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116447714191251575", "content": "", "creation_timestamp": "2026-04-22T09:45:08.266107Z"}</description>
      <content:encoded>{"uuid": "7884e0ac-590c-41a2-9ee5-f472914b4f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116447714191251575", "content": "", "creation_timestamp": "2026-04-22T09:45:08.266107Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7884e0ac-590c-41a2-9ee5-f472914b4f7d/export</guid>
      <pubDate>Wed, 22 Apr 2026 09:45:08 +0000</pubDate>
    </item>
    <item>
      <title>cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39</title>
      <link>https://vulnerability.circl.lu/sighting/cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39/export</link>
      <description>{"uuid": "cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkl2oanfoq2o", "content": "", "creation_timestamp": "2026-04-28T16:59:45.075780Z"}</description>
      <content:encoded>{"uuid": "cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkl2oanfoq2o", "content": "", "creation_timestamp": "2026-04-28T16:59:45.075780Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cfaa7b00-b7ed-4e89-b3bc-a26c37d86a39/export</guid>
      <pubDate>Tue, 28 Apr 2026 16:59:45 +0000</pubDate>
    </item>
    <item>
      <title>11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a</title>
      <link>https://vulnerability.circl.lu/sighting/11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a/export</link>
      <description>{"uuid": "11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515405426636916", "content": "#OT #Advisory VDE-2026-046VEGA: Unsecured Configuration Interface Allows Unauthorized Access Leading to Privilege Escalation\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-046/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-046.json", "creation_timestamp": "2026-05-04T08:39:55.202627Z"}</description>
      <content:encoded>{"uuid": "11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515405426636916", "content": "#OT #Advisory VDE-2026-046VEGA: Unsecured Configuration Interface Allows Unauthorized Access Leading to Privilege Escalation\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-046/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-046.json", "creation_timestamp": "2026-05-04T08:39:55.202627Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a/export</guid>
      <pubDate>Mon, 04 May 2026 08:39:55 +0000</pubDate>
    </item>
    <item>
      <title>e877fa86-fd06-443a-8b09-4bc4ec7bef6a</title>
      <link>https://vulnerability.circl.lu/sighting/e877fa86-fd06-443a-8b09-4bc4ec7bef6a/export</link>
      <description>{"uuid": "e877fa86-fd06-443a-8b09-4bc4ec7bef6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515534446133473", "content": "#OT #Advisory VDE-2026-047VEGA: Missing Authentication for critical function in VEGAPULS Air products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-047/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-047.json", "creation_timestamp": "2026-05-04T09:12:43.127078Z"}</description>
      <content:encoded>{"uuid": "e877fa86-fd06-443a-8b09-4bc4ec7bef6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515534446133473", "content": "#OT #Advisory VDE-2026-047VEGA: Missing Authentication for critical function in VEGAPULS Air products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-047/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-047.json", "creation_timestamp": "2026-05-04T09:12:43.127078Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e877fa86-fd06-443a-8b09-4bc4ec7bef6a/export</guid>
      <pubDate>Mon, 04 May 2026 09:12:43 +0000</pubDate>
    </item>
    <item>
      <title>d292fe1c-b3b8-4d88-984d-aaa3680c92ff</title>
      <link>https://vulnerability.circl.lu/sighting/d292fe1c-b3b8-4d88-984d-aaa3680c92ff/export</link>
      <description>{"uuid": "d292fe1c-b3b8-4d88-984d-aaa3680c92ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515547941636846", "content": "#OT #Advisory VDE-2026-048VEGA: Missing Authentication for critical function in VEGAPULS Bluetooth products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-048/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-048.json", "creation_timestamp": "2026-05-04T09:16:09.070432Z"}</description>
      <content:encoded>{"uuid": "d292fe1c-b3b8-4d88-984d-aaa3680c92ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3323", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515547941636846", "content": "#OT #Advisory VDE-2026-048VEGA: Missing Authentication for critical function in VEGAPULS Bluetooth products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-048/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-048.json", "creation_timestamp": "2026-05-04T09:16:09.070432Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d292fe1c-b3b8-4d88-984d-aaa3680c92ff/export</guid>
      <pubDate>Mon, 04 May 2026 09:16:09 +0000</pubDate>
    </item>
  </channel>
</rss>
