<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:34:59.055721+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f31ee567-6910-4b55-b842-0e6e52e98c81/export</id>
    <title>f31ee567-6910-4b55-b842-0e6e52e98c81</title>
    <updated>2026-05-04T17:34:59.356658+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f31ee567-6910-4b55-b842-0e6e52e98c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21740", "type": "seen", "source": "https://t.me/cibsecurity/27018", "content": "\u203c CVE-2021-21740 \u203c\n\nThere is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T20:37:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f31ee567-6910-4b55-b842-0e6e52e98c81/export"/>
    <published>2021-08-09T20:37:08+00:00</published>
  </entry>
</feed>
