<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:25:10 +0000</lastBuildDate>
    <item>
      <title>0dce638e-8c35-45c4-9403-0329cdcb2c24</title>
      <link>https://vulnerability.circl.lu/sighting/0dce638e-8c35-45c4-9403-0329cdcb2c24/export</link>
      <description>{"uuid": "0dce638e-8c35-45c4-9403-0329cdcb2c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4287", "type": "seen", "source": "https://t.me/cibsecurity/55061", "content": "\u203c CVE-2022-4287 \u203c\n\nAuthentication bypass in local application lock feature in Devolutions Remote Desktop Manager 2022.3.26 and earlier on Windows allows malicious user to access the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T20:12:52.000000Z"}</description>
      <content:encoded>{"uuid": "0dce638e-8c35-45c4-9403-0329cdcb2c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4287", "type": "seen", "source": "https://t.me/cibsecurity/55061", "content": "\u203c CVE-2022-4287 \u203c\n\nAuthentication bypass in local application lock feature in Devolutions Remote Desktop Manager 2022.3.26 and earlier on Windows allows malicious user to access the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T20:12:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0dce638e-8c35-45c4-9403-0329cdcb2c24/export</guid>
      <pubDate>Wed, 21 Dec 2022 20:12:52 +0000</pubDate>
    </item>
    <item>
      <title>a86c650f-a19f-46a3-8871-a051bc599eec</title>
      <link>https://vulnerability.circl.lu/sighting/a86c650f-a19f-46a3-8871-a051bc599eec/export</link>
      <description>{"uuid": "a86c650f-a19f-46a3-8871-a051bc599eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42878", "type": "seen", "source": "https://t.me/cibsecurity/63777", "content": "\u203c CVE-2022-42878 \u203c\n\nNull pointer dereference for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:25:38.000000Z"}</description>
      <content:encoded>{"uuid": "a86c650f-a19f-46a3-8871-a051bc599eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42878", "type": "seen", "source": "https://t.me/cibsecurity/63777", "content": "\u203c CVE-2022-42878 \u203c\n\nNull pointer dereference for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:25:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a86c650f-a19f-46a3-8871-a051bc599eec/export</guid>
      <pubDate>Wed, 10 May 2023 18:25:38 +0000</pubDate>
    </item>
  </channel>
</rss>
