<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:11:11.440328+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5686a46f-04ef-4951-9f5d-72f8be1f3515/export</id>
    <title>5686a46f-04ef-4951-9f5d-72f8be1f3515</title>
    <updated>2026-05-06T11:11:11.737286+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5686a46f-04ef-4951-9f5d-72f8be1f3515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28792", "type": "seen", "source": "https://t.me/cibsecurity/41868", "content": "\u203c CVE-2022-28792 \u203c\n\nDLL hijacking vulnerability in Gear IconX PC Manager prior to version 2.1.220405.51 allows attacker to execute arbitrary code. The patch adds proper absolute path to prevent dll hijacking.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T00:39:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5686a46f-04ef-4951-9f5d-72f8be1f3515/export"/>
    <published>2022-05-04T00:39:00+00:00</published>
  </entry>
</feed>
