<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T22:38:38.858453+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/70afea9c-e5b4-46be-aacb-a73f72987e8b/export</id>
    <title>70afea9c-e5b4-46be-aacb-a73f72987e8b</title>
    <updated>2026-05-08T22:38:39.395373+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "70afea9c-e5b4-46be-aacb-a73f72987e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23768", "type": "seen", "source": "https://t.me/cibsecurity/50093", "content": "\u203c CVE-2022-23768 \u203c\n\nThis Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-20T00:38:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/70afea9c-e5b4-46be-aacb-a73f72987e8b/export"/>
    <published>2022-09-20T00:38:57+00:00</published>
  </entry>
</feed>
