<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T12:19:14.809389+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/10e5c38f-d657-4572-8486-3184e6ea4157/export</id>
    <title>10e5c38f-d657-4572-8486-3184e6ea4157</title>
    <updated>2026-05-07T12:19:15.177847+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "10e5c38f-d657-4572-8486-3184e6ea4157", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20222", "type": "seen", "source": "https://t.me/cibsecurity/25324", "content": "\u203c CVE-2021-20222 \u203c\n\nA flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-23T19:38:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/10e5c38f-d657-4572-8486-3184e6ea4157/export"/>
    <published>2021-03-23T19:38:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8e5b392e-f55c-4d1f-9a66-6ed23182aa49/export</id>
    <title>8e5b392e-f55c-4d1f-9a66-6ed23182aa49</title>
    <updated>2026-05-07T12:19:15.172777+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8e5b392e-f55c-4d1f-9a66-6ed23182aa49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20222", "type": "seen", "source": "https://t.me/arpsyndicate/3205", "content": "#ExploitObserverAlert\n\nCVE-2021-20222\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-20222. A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\nFIRST-EPSS: 0.001670000\nNVD-IS: 5.9\nNVD-ES: 1.6", "creation_timestamp": "2024-01-28T04:33:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8e5b392e-f55c-4d1f-9a66-6ed23182aa49/export"/>
    <published>2024-01-28T04:33:56+00:00</published>
  </entry>
</feed>
