<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:59:29.166944+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fb39c0bd-78ef-4c78-9833-58d88c88317f/export</id>
    <title>fb39c0bd-78ef-4c78-9833-58d88c88317f</title>
    <updated>2026-05-06T09:59:29.511420+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fb39c0bd-78ef-4c78-9833-58d88c88317f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42952", "type": "seen", "source": "https://t.me/cibsecurity/38124", "content": "\u203c CVE-2021-42952 \u203c\n\nAll pervious versions before October 25, 2021 of Zepl Notebooks are affeced by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T22:21:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fb39c0bd-78ef-4c78-9833-58d88c88317f/export"/>
    <published>2022-02-25T22:21:09+00:00</published>
  </entry>
</feed>
