<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T15:31:15.873500+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/da97a3ac-b2a0-41a2-9de8-7c95555be15b/export</id>
    <title>da97a3ac-b2a0-41a2-9de8-7c95555be15b</title>
    <updated>2026-05-05T15:31:16.242146+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "da97a3ac-b2a0-41a2-9de8-7c95555be15b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36438", "type": "seen", "source": "https://t.me/cibsecurity/51664", "content": "\u203c CVE-2022-36438 \u203c\n\nAsusSwitch.exe on ASUS personal computers (running Windows) sets weak file permissions, leading to local privilege escalation (this also can be used to delete files within the system arbitrarily). This affects ASUS System Control Interface 3 before 3.1.5.0, and AsusSwitch.exe before 1.0.10.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-18T16:14:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/da97a3ac-b2a0-41a2-9de8-7c95555be15b/export"/>
    <published>2022-10-18T16:14:00+00:00</published>
  </entry>
</feed>
