<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T11:14:59.521804+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1161e596-28bd-4651-8ecd-353a78385753/export</id>
    <title>1161e596-28bd-4651-8ecd-353a78385753</title>
    <updated>2026-05-04T11:14:59.890863+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1161e596-28bd-4651-8ecd-353a78385753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/167600", "content": "https://ift.tt/7t6NZEa\nCVE-2022-4962", "creation_timestamp": "2024-01-12T23:36:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1161e596-28bd-4651-8ecd-353a78385753/export"/>
    <published>2024-01-12T23:36:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/575c0d98-c237-4fd6-a838-4d9a0cf91e0a/export</id>
    <title>575c0d98-c237-4fd6-a838-4d9a0cf91e0a</title>
    <updated>2026-05-04T11:14:59.890776+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "575c0d98-c237-4fd6-a838-4d9a0cf91e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/arpsyndicate/2770", "content": "#ExploitObserverAlert\n\nCVE-2022-4962\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-4962. A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive.", "creation_timestamp": "2024-01-15T08:26:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/575c0d98-c237-4fd6-a838-4d9a0cf91e0a/export"/>
    <published>2024-01-15T08:26:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/514c7fbb-624e-4c04-9fdd-6e0c7ee38636/export</id>
    <title>514c7fbb-624e-4c04-9fdd-6e0c7ee38636</title>
    <updated>2026-05-04T11:14:59.890687+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "514c7fbb-624e-4c04-9fdd-6e0c7ee38636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/171362", "content": "https://ift.tt/9DT2IqM\nCVE-2022-4962 Exploit", "creation_timestamp": "2024-01-22T19:17:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/514c7fbb-624e-4c04-9fdd-6e0c7ee38636/export"/>
    <published>2024-01-22T19:17:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c6f8de5-d493-4e62-b178-6c82d0785214/export</id>
    <title>3c6f8de5-d493-4e62-b178-6c82d0785214</title>
    <updated>2026-05-04T11:14:59.890010+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c6f8de5-d493-4e62-b178-6c82d0785214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/175859", "content": "https://ift.tt/Hi4DdN1\nCVE-2022-4962 | Apollo 2.0.0/2.0.1 Configuration Center /users improper authorization (Issue 4684)", "creation_timestamp": "2024-01-30T12:16:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c6f8de5-d493-4e62-b178-6c82d0785214/export"/>
    <published>2024-01-30T12:16:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/046cdd00-e37c-4b1c-b564-f4015749589a/export</id>
    <title>046cdd00-e37c-4b1c-b564-f4015749589a</title>
    <updated>2026-05-04T11:14:59.889923+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "046cdd00-e37c-4b1c-b564-f4015749589a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-49622", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/046cdd00-e37c-4b1c-b564-f4015749589a/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef7827f2-0d42-4e21-a9e2-c8a5937be471/export</id>
    <title>ef7827f2-0d42-4e21-a9e2-c8a5937be471</title>
    <updated>2026-05-04T11:14:59.889153+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "ef7827f2-0d42-4e21-a9e2-c8a5937be471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-49623", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef7827f2-0d42-4e21-a9e2-c8a5937be471/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/efe50bf3-336b-4bbd-8bfd-16201ced5c9f/export</id>
    <title>efe50bf3-336b-4bbd-8bfd-16201ced5c9f</title>
    <updated>2026-05-04T11:14:59.886757+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "efe50bf3-336b-4bbd-8bfd-16201ced5c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-49622", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/efe50bf3-336b-4bbd-8bfd-16201ced5c9f/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
