<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T02:39:10.287507+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/267742fc-5ad8-4668-ad55-a545d3b2700f/export</id>
    <title>267742fc-5ad8-4668-ad55-a545d3b2700f</title>
    <updated>2026-05-05T02:39:10.745935+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "267742fc-5ad8-4668-ad55-a545d3b2700f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42332", "type": "seen", "source": "https://t.me/cibsecurity/30608", "content": "\u203c CVE-2021-42332 \u203c\n\nThe \u00e2\u20ac\u0153List View\u00e2\u20ac\ufffd function of ShinHer StudyOnline System is not under authority control. After logging in with user\u00e2\u20ac\u2122s privilege, remote attackers can access the content of other users\u00e2\u20ac\u2122 message boards by crafting URL parameters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T16:28:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/267742fc-5ad8-4668-ad55-a545d3b2700f/export"/>
    <published>2021-10-15T16:28:38+00:00</published>
  </entry>
</feed>
