<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:36:20.246971+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3995995e-adb7-43e7-a896-33b13e7bdcd5/export</id>
    <title>3995995e-adb7-43e7-a896-33b13e7bdcd5</title>
    <updated>2026-05-04T21:36:20.608945+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3995995e-adb7-43e7-a896-33b13e7bdcd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-46895", "type": "seen", "source": "https://t.me/cibsecurity/68392", "content": "\u203c CVE-2021-46895 \u203c\n\nVulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-13T16:18:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3995995e-adb7-43e7-a896-33b13e7bdcd5/export"/>
    <published>2023-08-13T16:18:26+00:00</published>
  </entry>
</feed>
