<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T14:48:15.164580+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0bf12b25-5076-4498-83a3-bd1bb13eeca6/export</id>
    <title>0bf12b25-5076-4498-83a3-bd1bb13eeca6</title>
    <updated>2026-05-01T14:48:15.614907+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0bf12b25-5076-4498-83a3-bd1bb13eeca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33993", "type": "seen", "source": "https://t.me/cibsecurity/48159", "content": "\u203c CVE-2022-33993 \u203c\n\nMisinterpretation of special domain name characters in DNRD (aka Domain Name Relay Daemon) 2.20.3 leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-15T16:37:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0bf12b25-5076-4498-83a3-bd1bb13eeca6/export"/>
    <published>2022-08-15T16:37:55+00:00</published>
  </entry>
</feed>
