<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T19:46:11.133211+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/16537f2d-c553-4605-8431-67fc2db80c5d/export</id>
    <title>16537f2d-c553-4605-8431-67fc2db80c5d</title>
    <updated>2026-05-05T19:46:11.418009+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "16537f2d-c553-4605-8431-67fc2db80c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10740", "type": "seen", "source": "https://t.me/cibsecurity/2277", "content": "ATENTION\u203c New - CVE-2016-10740\n\nVarious resources in Atlassian Crowd before version 2.10.1 allow remote attackers with administration rights to learn the passwords of configured LDAP directories by examining the responses to requests for these resources.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-01-29T07:22:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/16537f2d-c553-4605-8431-67fc2db80c5d/export"/>
    <published>2019-01-29T07:22:20+00:00</published>
  </entry>
</feed>
