<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 07:34:38 +0000</lastBuildDate>
    <item>
      <title>272cea56-1b3b-47a3-ac6c-8438dfd1ade3</title>
      <link>https://vulnerability.circl.lu/sighting/272cea56-1b3b-47a3-ac6c-8438dfd1ade3/export</link>
      <description>{"uuid": "272cea56-1b3b-47a3-ac6c-8438dfd1ade3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20202", "type": "seen", "source": "https://t.me/arpsyndicate/3192", "content": "#ExploitObserverAlert\n\nCVE-2021-20202\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.5\nNVD-ES: 1.8", "creation_timestamp": "2024-01-28T03:54:33.000000Z"}</description>
      <content:encoded>{"uuid": "272cea56-1b3b-47a3-ac6c-8438dfd1ade3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20202", "type": "seen", "source": "https://t.me/arpsyndicate/3192", "content": "#ExploitObserverAlert\n\nCVE-2021-20202\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.5\nNVD-ES: 1.8", "creation_timestamp": "2024-01-28T03:54:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/272cea56-1b3b-47a3-ac6c-8438dfd1ade3/export</guid>
      <pubDate>Sun, 28 Jan 2024 03:54:33 +0000</pubDate>
    </item>
  </channel>
</rss>
