<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:18:13 +0000</lastBuildDate>
    <item>
      <title>fb39c0bd-78ef-4c78-9833-58d88c88317f</title>
      <link>https://vulnerability.circl.lu/sighting/fb39c0bd-78ef-4c78-9833-58d88c88317f/export</link>
      <description>{"uuid": "fb39c0bd-78ef-4c78-9833-58d88c88317f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42952", "type": "seen", "source": "https://t.me/cibsecurity/38124", "content": "\u203c CVE-2021-42952 \u203c\n\nAll pervious versions before October 25, 2021 of Zepl Notebooks are affeced by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T22:21:09.000000Z"}</description>
      <content:encoded>{"uuid": "fb39c0bd-78ef-4c78-9833-58d88c88317f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42952", "type": "seen", "source": "https://t.me/cibsecurity/38124", "content": "\u203c CVE-2021-42952 \u203c\n\nAll pervious versions before October 25, 2021 of Zepl Notebooks are affeced by a sandbox escape vulnerability. Upon launching Remote Code Execution from the Notebook, users can then use that to subsequently escape the running context sandbox and proceed to access internal Zepl assets including cloud metadata services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T22:21:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fb39c0bd-78ef-4c78-9833-58d88c88317f/export</guid>
      <pubDate>Fri, 25 Feb 2022 22:21:09 +0000</pubDate>
    </item>
  </channel>
</rss>
