<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:48:09 +0000</lastBuildDate>
    <item>
      <title>3ac798bd-8ffd-470c-9cab-db40983e68ed</title>
      <link>https://vulnerability.circl.lu/sighting/3ac798bd-8ffd-470c-9cab-db40983e68ed/export</link>
      <description>{"uuid": "3ac798bd-8ffd-470c-9cab-db40983e68ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42990", "type": "seen", "source": "https://t.me/cibsecurity/33500", "content": "\u203c CVE-2021-42990 \u203c\n\nFlexiHub For Windows is affected by Buffer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:13.000000Z"}</description>
      <content:encoded>{"uuid": "3ac798bd-8ffd-470c-9cab-db40983e68ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42990", "type": "seen", "source": "https://t.me/cibsecurity/33500", "content": "\u203c CVE-2021-42990 \u203c\n\nFlexiHub For Windows is affected by Buffer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3ac798bd-8ffd-470c-9cab-db40983e68ed/export</guid>
      <pubDate>Tue, 07 Dec 2021 22:22:13 +0000</pubDate>
    </item>
  </channel>
</rss>
