<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:21:05.117067+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6752f56b-e23d-4767-bd36-61b7639c2969/export</id>
    <title>6752f56b-e23d-4767-bd36-61b7639c2969</title>
    <updated>2026-05-04T19:21:05.602967+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6752f56b-e23d-4767-bd36-61b7639c2969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25577", "type": "seen", "source": "https://t.me/cibsecurity/39545", "content": "\u203c CVE-2022-25577 \u203c\n\nALF-BanCO v8.2.5 and below was discovered to use a hardcoded password to encrypt the SQLite database containing the user's data. Attackers who are able to gain remote or local access to the system are able to read and modify the data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-25T19:30:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6752f56b-e23d-4767-bd36-61b7639c2969/export"/>
    <published>2022-03-25T19:30:54+00:00</published>
  </entry>
</feed>
