<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours#CVE_2026_33017 https:&#x2F;&#x2F;www.sysdig.com&#x2F;blog&#x2F;cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours]]></title><description><![CDATA[<p>CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours<br /><a href="https://infosec.exchange/tags/CVE_2026_33017" rel="tag">#<span>CVE_2026_33017</span></a> <br /><a href="https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours" rel="nofollow noopener"><span>https://www.</span><span>sysdig.com/blog/cve-2026-33017</span><span>-how-attackers-compromised-langflow-ai-pipelines-in-20-hours</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/4736f3a0-5290-4b29-b99c-97b728a429da/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours-cve_2026_33017-https-www.sysdig.com-blog-cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 00:05:25 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4736f3a0-5290-4b29-b99c-97b728a429da.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 23 Mar 2026 13:29:46 GMT</pubDate><ttl>60</ttl></channel></rss>