<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T20:51:02.107507+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9338ada-8725-461d-88c0-ebb4eda003d2/export</id>
    <title>d9338ada-8725-461d-88c0-ebb4eda003d2</title>
    <updated>2026-05-04T20:51:02.452262+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9338ada-8725-461d-88c0-ebb4eda003d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44310", "type": "seen", "source": "https://t.me/cibsecurity/58889", "content": "\u203c CVE-2022-44310 \u203c\n\nIn Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-24T22:19:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9338ada-8725-461d-88c0-ebb4eda003d2/export"/>
    <published>2023-02-24T22:19:23+00:00</published>
  </entry>
</feed>
