<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:21:34.406709+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0bd964ad-37fe-4c08-b200-5bbb5f26a330/export</id>
    <title>0bd964ad-37fe-4c08-b200-5bbb5f26a330</title>
    <updated>2026-05-04T14:21:34.725644+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0bd964ad-37fe-4c08-b200-5bbb5f26a330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47557", "type": "seen", "source": "https://t.me/cibsecurity/70710", "content": "\u203c CVE-2022-47557 \u203c\n\n** UNSUPPPORTED WHEN ASSIGNED ** Vulnerability in ekorCCP and ekorRCI that could allow an attacker with access to the network where the device is located to decrypt the credentials of privileged users, and subsequently gain access to the system to perform malicious actions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-19T16:29:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0bd964ad-37fe-4c08-b200-5bbb5f26a330/export"/>
    <published>2023-09-19T16:29:16+00:00</published>
  </entry>
</feed>
