{"vulnerability": "CVE-2026-42779", "sightings": [{"uuid": "9250739f-43ba-4761-a414-e614e258ee75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42779", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mks65q3xcz2i", "content": "CVE-2026-42779 - Apache MINA: AbstractIoBuffer.resolveClass() null-clazz Branch Skips acceptMatchers Filter \u2014 Full Object Deserialization RCE (take 2)\nCVE ID : CVE-2026-42779\n \n Published : May 1, 2026, 11:16 a.m. | 1\u00a0hour, 3\u00a0minutes ago\n \n Description : The fix for CVE-2026-4...", "creation_timestamp": "2026-05-01T12:50:44.231064Z"}, {"uuid": "c6000d95-e8ac-47e2-9c5b-23f2daccefc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42779", "type": "seen", "source": "Telegram/cYbomHaTGTLOs95SVGZEas4XOSbbs1P0dkn6F8I8p6igQwc", "content": "", "creation_timestamp": "2026-05-02T15:00:06.000000Z"}, {"uuid": "501ede0b-9e01-43b9-b1f0-007299f164ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42779", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mks7bkcvh72o", "content": "Apache MINA \u306e AbstractIoBuffer.resolveClass() \u306b\u8106\u5f31\u6027\u3002\u9759\u7684\u30af\u30e9\u30b9/\u30d7\u30ea\u30df\u30c6\u30a3\u30d6\u578b\u306e\u5834\u5408\u3001\u30af\u30e9\u30b9\u540d\u30c1\u30a7\u30c3\u30af\u3092\u8fc2\u56de\u3057\u3001\u4efb\u610f\u306e\u30b3\u30fc\u30c9\u5b9f\u884c\u304c\u53ef\u80fd\u306b\u306a\u308b\u53ef\u80fd\u6027\u304c\u2026\nCVE-2026-42779 CVSS 9.8 | CRITICAL", "creation_timestamp": "2026-05-01T13:10:45.465900Z"}]}