<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T21:06:18.979204+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/011c18a3-dbe2-472c-a939-bc8936d31017/export</id>
    <title>011c18a3-dbe2-472c-a939-bc8936d31017</title>
    <updated>2026-05-05T21:06:19.326376+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "011c18a3-dbe2-472c-a939-bc8936d31017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44662", "type": "seen", "source": "https://t.me/cibsecurity/38045", "content": "\u203c CVE-2021-44662 \u203c\n\nA Site Scripting (XSS) vulnerability exists in the Xerte Project Xerte through 3.8.4 via the link parameter in print.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:14:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/011c18a3-dbe2-472c-a939-bc8936d31017/export"/>
    <published>2022-02-24T22:14:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/97530ecf-0b0f-43bc-b155-c73d83ca5f0b/export</id>
    <title>97530ecf-0b0f-43bc-b155-c73d83ca5f0b</title>
    <updated>2026-05-05T21:06:19.326280+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "97530ecf-0b0f-43bc-b155-c73d83ca5f0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44663", "type": "seen", "source": "https://t.me/cibsecurity/38052", "content": "\u203c CVE-2021-44663 \u203c\n\nA Remote Code Execution (RCE) vulnerability exists in the Xerte Project Xerte through 3.8.4 via a crafted php file through elfinder in connetor.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:15:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/97530ecf-0b0f-43bc-b155-c73d83ca5f0b/export"/>
    <published>2022-02-24T22:15:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/154e71e0-145a-4662-af73-e3f18ff04aae/export</id>
    <title>154e71e0-145a-4662-af73-e3f18ff04aae</title>
    <updated>2026-05-05T21:06:19.326187+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "154e71e0-145a-4662-af73-e3f18ff04aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44664", "type": "seen", "source": "https://t.me/cibsecurity/38060", "content": "\u203c CVE-2021-44664 \u203c\n\nAn Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T00:20:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/154e71e0-145a-4662-af73-e3f18ff04aae/export"/>
    <published>2022-02-25T00:20:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/131fb18e-cf38-4c33-8407-32f17731ee07/export</id>
    <title>131fb18e-cf38-4c33-8407-32f17731ee07</title>
    <updated>2026-05-05T21:06:19.326084+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "131fb18e-cf38-4c33-8407-32f17731ee07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44665", "type": "seen", "source": "https://t.me/cibsecurity/38067", "content": "\u203c CVE-2021-44665 \u203c\n\nA Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T00:20:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/131fb18e-cf38-4c33-8407-32f17731ee07/export"/>
    <published>2022-02-25T00:20:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/059086be-a03a-403d-bcb5-c6ecd712da37/export</id>
    <title>059086be-a03a-403d-bcb5-c6ecd712da37</title>
    <updated>2026-05-05T21:06:19.325957+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "059086be-a03a-403d-bcb5-c6ecd712da37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44667", "type": "seen", "source": "https://t.me/cibsecurity/38827", "content": "\u203c CVE-2021-44667 \u203c\n\nA Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-11T22:21:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/059086be-a03a-403d-bcb5-c6ecd712da37/export"/>
    <published>2022-03-11T22:21:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2aab6d29-462c-4183-981f-5416bf1b32d8/export</id>
    <title>2aab6d29-462c-4183-981f-5416bf1b32d8</title>
    <updated>2026-05-05T21:06:19.322718+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2aab6d29-462c-4183-981f-5416bf1b32d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44667", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwmrsapw2w26", "content": "", "creation_timestamp": "2025-08-17T21:02:25.947757Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2aab6d29-462c-4183-981f-5416bf1b32d8/export"/>
    <published>2025-08-17T21:02:25.947757+00:00</published>
  </entry>
</feed>
