<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:41:36.697821+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f2cae43-b3ed-4599-b106-9596de57cf9b/export</id>
    <title>4f2cae43-b3ed-4599-b106-9596de57cf9b</title>
    <updated>2026-05-04T13:41:37.105049+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f2cae43-b3ed-4599-b106-9596de57cf9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41511", "type": "seen", "source": "https://t.me/cibsecurity/29864", "content": "\u203c CVE-2021-41511 \u203c\n\nThe username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-04T16:23:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f2cae43-b3ed-4599-b106-9596de57cf9b/export"/>
    <published>2021-10-04T16:23:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/20696a8e-a4fe-443a-8745-6a447c6597be/export</id>
    <title>20696a8e-a4fe-443a-8745-6a447c6597be</title>
    <updated>2026-05-04T13:41:37.102584+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "20696a8e-a4fe-443a-8745-6a447c6597be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41511", "type": "published-proof-of-concept", "source": "Telegram/2Pzfo2gJqY9ixJYPhd_5hiHC7HxNewjinR5-bJIPTi9XUg", "content": "", "creation_timestamp": "2021-10-04T23:39:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/20696a8e-a4fe-443a-8745-6a447c6597be/export"/>
    <published>2021-10-04T23:39:46+00:00</published>
  </entry>
</feed>
