<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:31:31.305368+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa422765-ad5d-4fa9-b874-2fce3673891d/export</id>
    <title>fa422765-ad5d-4fa9-b874-2fce3673891d</title>
    <updated>2026-05-06T17:31:31.722385+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa422765-ad5d-4fa9-b874-2fce3673891d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28000", "type": "seen", "source": "https://t.me/cibsecurity/27596", "content": "\u203c CVE-2021-28000 \u203c\n\nA persistent cross-site scripting vulnerability was discovered in Local Services Search Engine Management System Project 1.0 which allows remote attackers to execute arbitrary code via crafted payloads entered into the Name and Address fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-19T18:17:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa422765-ad5d-4fa9-b874-2fce3673891d/export"/>
    <published>2021-08-19T18:17:58+00:00</published>
  </entry>
</feed>
