<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T00:50:40.720932+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02549b9b-f5e1-4c3b-ba4e-635f05290b95/export</id>
    <title>02549b9b-f5e1-4c3b-ba4e-635f05290b95</title>
    <updated>2026-05-08T00:50:41.123885+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02549b9b-f5e1-4c3b-ba4e-635f05290b95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40493", "type": "seen", "source": "https://t.me/cibsecurity/30546", "content": "\u203c CVE-2021-40493 \u203c\n\nZoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-14T02:26:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02549b9b-f5e1-4c3b-ba4e-635f05290b95/export"/>
    <published>2021-10-14T02:26:56+00:00</published>
  </entry>
</feed>
