<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T23:31:44.626526+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b1496fd0-6820-4b8b-a21b-b153d74493e8/export</id>
    <title>b1496fd0-6820-4b8b-a21b-b153d74493e8</title>
    <updated>2026-05-08T23:31:44.973908+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b1496fd0-6820-4b8b-a21b-b153d74493e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37794", "type": "seen", "source": "https://t.me/cibsecurity/28132", "content": "\u203c CVE-2021-37794 \u203c\n\nA stored cross-site scripting (XSS) vulnerability exists in FileBrowser &amp;lt; v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T22:33:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b1496fd0-6820-4b8b-a21b-b153d74493e8/export"/>
    <published>2021-08-31T22:33:42+00:00</published>
  </entry>
</feed>
