<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T22:10:23.537839+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6b51ba5-e596-4b81-9ae3-a5777a762fb8/export</id>
    <title>d6b51ba5-e596-4b81-9ae3-a5777a762fb8</title>
    <updated>2026-05-08T22:10:23.903347+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6b51ba5-e596-4b81-9ae3-a5777a762fb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-45427", "type": "seen", "source": "https://t.me/cibsecurity/34752", "content": "\u203c CVE-2021-45427 \u203c\n\nEmerson XWEB 300D EVO 3.0.7--3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-30T14:33:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6b51ba5-e596-4b81-9ae3-a5777a762fb8/export"/>
    <published>2021-12-30T14:33:52+00:00</published>
  </entry>
</feed>
