<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:40:13.806969+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0dce638e-8c35-45c4-9403-0329cdcb2c24/export</id>
    <title>0dce638e-8c35-45c4-9403-0329cdcb2c24</title>
    <updated>2026-05-06T10:40:14.156425+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0dce638e-8c35-45c4-9403-0329cdcb2c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4287", "type": "seen", "source": "https://t.me/cibsecurity/55061", "content": "\u203c CVE-2022-4287 \u203c\n\nAuthentication bypass in local application lock feature in Devolutions Remote Desktop Manager 2022.3.26 and earlier on Windows allows malicious user to access the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T20:12:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0dce638e-8c35-45c4-9403-0329cdcb2c24/export"/>
    <published>2022-12-21T20:12:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a86c650f-a19f-46a3-8871-a051bc599eec/export</id>
    <title>a86c650f-a19f-46a3-8871-a051bc599eec</title>
    <updated>2026-05-06T10:40:14.153983+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a86c650f-a19f-46a3-8871-a051bc599eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42878", "type": "seen", "source": "https://t.me/cibsecurity/63777", "content": "\u203c CVE-2022-42878 \u203c\n\nNull pointer dereference for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:25:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a86c650f-a19f-46a3-8871-a051bc599eec/export"/>
    <published>2023-05-10T18:25:38+00:00</published>
  </entry>
</feed>
