<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T02:42:24.187334+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/17ba4899-9ee4-491a-a2a8-5ca8a4fe2c3a/export</id>
    <title>17ba4899-9ee4-491a-a2a8-5ca8a4fe2c3a</title>
    <updated>2026-05-07T02:42:24.545871+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "17ba4899-9ee4-491a-a2a8-5ca8a4fe2c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30605", "type": "seen", "source": "https://t.me/cibsecurity/28540", "content": "\u203c CVE-2021-30605 \u203c\n\nInappropriate implementation in the ChromeOS Readiness Tool installer on Windows prior to 1.0.2.0 loosens DCOM access rights on two objects allowing an attacker to potentially bypass discretionary access controls.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-09T00:28:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/17ba4899-9ee4-491a-a2a8-5ca8a4fe2c3a/export"/>
    <published>2021-09-09T00:28:59+00:00</published>
  </entry>
</feed>
