<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T01:55:14.010593+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2eb2a0af-d8da-4c44-9218-a9178919dd10/export</id>
    <title>2eb2a0af-d8da-4c44-9218-a9178919dd10</title>
    <updated>2026-05-06T01:55:14.433299+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2eb2a0af-d8da-4c44-9218-a9178919dd10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33231", "type": "seen", "source": "https://t.me/cibsecurity/51863", "content": "\u203c CVE-2021-33231 \u203c\n\nCross Site Scripting (XSS) vulnerability in New equipment page in EasyVista Service Manager 2018.1.181.1 allows remote attackers to run arbitrary code via the notes field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-20T14:21:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2eb2a0af-d8da-4c44-9218-a9178919dd10/export"/>
    <published>2022-10-20T14:21:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4b08eb54-4914-466e-a2e6-ad31136d9cbc/export</id>
    <title>4b08eb54-4914-466e-a2e6-ad31136d9cbc</title>
    <updated>2026-05-06T01:55:14.430890+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4b08eb54-4914-466e-a2e6-ad31136d9cbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33231", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15575", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-33231\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cross Site Scripting (XSS) vulnerability in New equipment page in EasyVista Service Manager 2018.1.181.1 allows remote attackers to run arbitrary code via the notes field.\n\ud83d\udccf Published: 2022-10-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T18:04:33.926Z\n\ud83d\udd17 References:\n1. http://easyvista.com\n2. https://armysick.github.io/cve-2021-33231/", "creation_timestamp": "2025-05-08T18:24:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4b08eb54-4914-466e-a2e6-ad31136d9cbc/export"/>
    <published>2025-05-08T18:24:18+00:00</published>
  </entry>
</feed>
