<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T14:27:18.086798+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/589d9389-212c-45ee-9afc-ef889b0336f6/export</id>
    <title>589d9389-212c-45ee-9afc-ef889b0336f6</title>
    <updated>2026-05-05T14:27:18.413279+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "589d9389-212c-45ee-9afc-ef889b0336f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41739", "type": "seen", "source": "https://t.me/cibsecurity/41969", "content": "\u203c CVE-2021-41739 \u203c\n\nA OS Command Injection vulnerability was discovered in Artica Proxy 4.30.000000. Attackers can execute OS commands in cyrus.events.php with GET param logs and POST param rp.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T14:36:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/589d9389-212c-45ee-9afc-ef889b0336f6/export"/>
    <published>2022-05-05T14:36:15+00:00</published>
  </entry>
</feed>
