<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T20:33:08.624396+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cca71a70-e064-430c-bb5d-17dc6b7370c9/export</id>
    <title>cca71a70-e064-430c-bb5d-17dc6b7370c9</title>
    <updated>2026-05-09T20:33:09.010082+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cca71a70-e064-430c-bb5d-17dc6b7370c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21751", "type": "seen", "source": "https://t.me/cibsecurity/34683", "content": "\u203c CVE-2021-21751 \u203c\n\nZTE BigVideo analysis product has an input verification vulnerability. Due to the inconsistency between the front and back verifications when configuring the large screen page, an attacker with high privileges could exploit this vulnerability to tamper with the URL and cause service exception.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-27T22:23:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cca71a70-e064-430c-bb5d-17dc6b7370c9/export"/>
    <published>2021-12-27T22:23:08+00:00</published>
  </entry>
</feed>
