<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 16:00:55 +0000</lastBuildDate>
    <item>
      <title>1161e596-28bd-4651-8ecd-353a78385753</title>
      <link>https://vulnerability.circl.lu/sighting/1161e596-28bd-4651-8ecd-353a78385753/export</link>
      <description>{"uuid": "1161e596-28bd-4651-8ecd-353a78385753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/167600", "content": "https://ift.tt/7t6NZEa\nCVE-2022-4962", "creation_timestamp": "2024-01-12T23:36:31.000000Z"}</description>
      <content:encoded>{"uuid": "1161e596-28bd-4651-8ecd-353a78385753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/167600", "content": "https://ift.tt/7t6NZEa\nCVE-2022-4962", "creation_timestamp": "2024-01-12T23:36:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1161e596-28bd-4651-8ecd-353a78385753/export</guid>
      <pubDate>Fri, 12 Jan 2024 23:36:31 +0000</pubDate>
    </item>
    <item>
      <title>575c0d98-c237-4fd6-a838-4d9a0cf91e0a</title>
      <link>https://vulnerability.circl.lu/sighting/575c0d98-c237-4fd6-a838-4d9a0cf91e0a/export</link>
      <description>{"uuid": "575c0d98-c237-4fd6-a838-4d9a0cf91e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/arpsyndicate/2770", "content": "#ExploitObserverAlert\n\nCVE-2022-4962\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-4962. A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive.", "creation_timestamp": "2024-01-15T08:26:37.000000Z"}</description>
      <content:encoded>{"uuid": "575c0d98-c237-4fd6-a838-4d9a0cf91e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/arpsyndicate/2770", "content": "#ExploitObserverAlert\n\nCVE-2022-4962\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-4962. A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive.", "creation_timestamp": "2024-01-15T08:26:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/575c0d98-c237-4fd6-a838-4d9a0cf91e0a/export</guid>
      <pubDate>Mon, 15 Jan 2024 08:26:37 +0000</pubDate>
    </item>
    <item>
      <title>514c7fbb-624e-4c04-9fdd-6e0c7ee38636</title>
      <link>https://vulnerability.circl.lu/sighting/514c7fbb-624e-4c04-9fdd-6e0c7ee38636/export</link>
      <description>{"uuid": "514c7fbb-624e-4c04-9fdd-6e0c7ee38636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/171362", "content": "https://ift.tt/9DT2IqM\nCVE-2022-4962 Exploit", "creation_timestamp": "2024-01-22T19:17:00.000000Z"}</description>
      <content:encoded>{"uuid": "514c7fbb-624e-4c04-9fdd-6e0c7ee38636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/171362", "content": "https://ift.tt/9DT2IqM\nCVE-2022-4962 Exploit", "creation_timestamp": "2024-01-22T19:17:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/514c7fbb-624e-4c04-9fdd-6e0c7ee38636/export</guid>
      <pubDate>Mon, 22 Jan 2024 19:17:00 +0000</pubDate>
    </item>
    <item>
      <title>3c6f8de5-d493-4e62-b178-6c82d0785214</title>
      <link>https://vulnerability.circl.lu/sighting/3c6f8de5-d493-4e62-b178-6c82d0785214/export</link>
      <description>{"uuid": "3c6f8de5-d493-4e62-b178-6c82d0785214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/175859", "content": "https://ift.tt/Hi4DdN1\nCVE-2022-4962 | Apollo 2.0.0/2.0.1 Configuration Center /users improper authorization (Issue 4684)", "creation_timestamp": "2024-01-30T12:16:54.000000Z"}</description>
      <content:encoded>{"uuid": "3c6f8de5-d493-4e62-b178-6c82d0785214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4962", "type": "seen", "source": "https://t.me/ctinow/175859", "content": "https://ift.tt/Hi4DdN1\nCVE-2022-4962 | Apollo 2.0.0/2.0.1 Configuration Center /users improper authorization (Issue 4684)", "creation_timestamp": "2024-01-30T12:16:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c6f8de5-d493-4e62-b178-6c82d0785214/export</guid>
      <pubDate>Tue, 30 Jan 2024 12:16:54 +0000</pubDate>
    </item>
    <item>
      <title>046cdd00-e37c-4b1c-b564-f4015749589a</title>
      <link>https://vulnerability.circl.lu/sighting/046cdd00-e37c-4b1c-b564-f4015749589a/export</link>
      <description>{"uuid": "046cdd00-e37c-4b1c-b564-f4015749589a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-49622", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "046cdd00-e37c-4b1c-b564-f4015749589a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-49622", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/046cdd00-e37c-4b1c-b564-f4015749589a/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>ef7827f2-0d42-4e21-a9e2-c8a5937be471</title>
      <link>https://vulnerability.circl.lu/sighting/ef7827f2-0d42-4e21-a9e2-c8a5937be471/export</link>
      <description>{"uuid": "ef7827f2-0d42-4e21-a9e2-c8a5937be471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-49623", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "ef7827f2-0d42-4e21-a9e2-c8a5937be471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-49623", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ef7827f2-0d42-4e21-a9e2-c8a5937be471/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>efe50bf3-336b-4bbd-8bfd-16201ced5c9f</title>
      <link>https://vulnerability.circl.lu/sighting/efe50bf3-336b-4bbd-8bfd-16201ced5c9f/export</link>
      <description>{"uuid": "efe50bf3-336b-4bbd-8bfd-16201ced5c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-49622", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "efe50bf3-336b-4bbd-8bfd-16201ced5c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-49622", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/efe50bf3-336b-4bbd-8bfd-16201ced5c9f/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
