<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:24:59 +0000</lastBuildDate>
    <item>
      <title>94893561-ee02-4dbf-8b7c-7ab35a41303a</title>
      <link>https://vulnerability.circl.lu/sighting/94893561-ee02-4dbf-8b7c-7ab35a41303a/export</link>
      <description>{"uuid": "94893561-ee02-4dbf-8b7c-7ab35a41303a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47558", "type": "seen", "source": "https://t.me/cibsecurity/70716", "content": "\u203c CVE-2022-47558 \u203c\n\n** UNSUPPPORTED WHEN ASSIGNED ** Devices ekorCCP and ekorRCI are vulnerable due to access to the FTP service using default credentials. Exploitation of this vulnerability can allow an attacker to modify critical files that could allow the creation of new users, delete or modify existing users, modify configuration files, install rootkits or backdoors.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-19T16:29:23.000000Z"}</description>
      <content:encoded>{"uuid": "94893561-ee02-4dbf-8b7c-7ab35a41303a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47558", "type": "seen", "source": "https://t.me/cibsecurity/70716", "content": "\u203c CVE-2022-47558 \u203c\n\n** UNSUPPPORTED WHEN ASSIGNED ** Devices ekorCCP and ekorRCI are vulnerable due to access to the FTP service using default credentials. Exploitation of this vulnerability can allow an attacker to modify critical files that could allow the creation of new users, delete or modify existing users, modify configuration files, install rootkits or backdoors.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-19T16:29:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/94893561-ee02-4dbf-8b7c-7ab35a41303a/export</guid>
      <pubDate>Tue, 19 Sep 2023 16:29:23 +0000</pubDate>
    </item>
  </channel>
</rss>
