<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:00:04.475144+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1013e153-1d22-4e1e-85d4-2bb946d5609b/export</id>
    <title>1013e153-1d22-4e1e-85d4-2bb946d5609b</title>
    <updated>2026-05-06T09:00:04.849783+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1013e153-1d22-4e1e-85d4-2bb946d5609b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41566", "type": "seen", "source": "https://t.me/cibsecurity/30262", "content": "\u203c CVE-2021-41566 \u203c\n\nThe file extension of the TadTools file upload function fails to filter, thus remote attackers can upload any types of files and execute arbitrary code without logging in.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-08T20:40:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1013e153-1d22-4e1e-85d4-2bb946d5609b/export"/>
    <published>2021-10-08T20:40:30+00:00</published>
  </entry>
</feed>
