<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:50:16.779418+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/308f08f6-c9ec-4885-b154-8df9faea751c/export</id>
    <title>308f08f6-c9ec-4885-b154-8df9faea751c</title>
    <updated>2026-05-06T19:50:17.209733+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "308f08f6-c9ec-4885-b154-8df9faea751c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31677", "type": "seen", "source": "https://t.me/cibsecurity/48972", "content": "\u203c CVE-2022-31677 \u203c\n\nAn Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T18:34:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/308f08f6-c9ec-4885-b154-8df9faea751c/export"/>
    <published>2022-08-29T18:34:18+00:00</published>
  </entry>
</feed>
