{"vulnerability": "CVE-2026-34387", "sightings": [{"uuid": "cace5f3f-a8c4-442d-ba76-b1c7cb99ff96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34387", "type": "published-proof-of-concept", "source": "Telegram/UCQVBQ1wk3sWuk0eQ1N0bHldnYCTUsbgi6Jx-voi5Wevn8w", "content": "", "creation_timestamp": "2026-04-07T23:20:49.000000Z"}, {"uuid": "2ae5e2d3-728d-4891-8057-982fe9d6475f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-34387", "type": "seen", "source": "https://bsky.app/profile/hugovalters.bsky.social/post/3mkplluaoik2f", "content": "Fleet CVE-2026-34387: Critical command injection via crafted package uninstall. Root/SYSTEM compromise. Patch to 4.81.1. Now. #CVE #CommandInjection #DevSecOps\n\n https://www.valtersit.com/cve/2026/03/cve-2026-34387/", "creation_timestamp": "2026-04-30T12:13:17.317727Z"}]}