<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T07:59:39.844254+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5d1a1e1d-3115-4ab8-b678-4e531cf6baf5/export</id>
    <title>5d1a1e1d-3115-4ab8-b678-4e531cf6baf5</title>
    <updated>2026-05-07T07:59:40.283464+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5d1a1e1d-3115-4ab8-b678-4e531cf6baf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25790", "type": "seen", "source": "https://t.me/cibsecurity/26446", "content": "\u203c CVE-2021-25790 \u203c\n\nMultiple stored cross site scripting (XSS) vulnerabilities in the \"Register\" module of House Rental and Property Listing 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in all text fields except for Phone Number and Alternate Phone Number.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-23T22:37:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5d1a1e1d-3115-4ab8-b678-4e531cf6baf5/export"/>
    <published>2021-07-23T22:37:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6d7d2282-7394-4384-a044-d8ff9b761322/export</id>
    <title>6d7d2282-7394-4384-a044-d8ff9b761322</title>
    <updated>2026-05-07T07:59:40.276066+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6d7d2282-7394-4384-a044-d8ff9b761322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25790", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/319", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-25790-Multiple-Stored-XSS : Multiple Stored XSS in House Rental and Property Listing\nURL\uff1ahttps://github.com/MrCraniums/CVE-2021-25790-Multiple-Stored-XSS", "creation_timestamp": "2021-08-16T11:48:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6d7d2282-7394-4384-a044-d8ff9b761322/export"/>
    <published>2021-08-16T11:48:47+00:00</published>
  </entry>
</feed>
