<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 23:23:45 +0000</lastBuildDate>
    <item>
      <title>2d9da0c2-d396-484c-af4c-d17f7b7da055</title>
      <link>https://vulnerability.circl.lu/sighting/2d9da0c2-d396-484c-af4c-d17f7b7da055/export</link>
      <description>{"uuid": "2d9da0c2-d396-484c-af4c-d17f7b7da055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21286", "type": "seen", "source": "https://t.me/cibsecurity/22892", "content": "\u203c CVE-2021-21286 \u203c\n\nAVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in version 10.2. All queries now remove the pass hash and the recoverPass hash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-01T19:25:06.000000Z"}</description>
      <content:encoded>{"uuid": "2d9da0c2-d396-484c-af4c-d17f7b7da055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21286", "type": "seen", "source": "https://t.me/cibsecurity/22892", "content": "\u203c CVE-2021-21286 \u203c\n\nAVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in version 10.2. All queries now remove the pass hash and the recoverPass hash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-01T19:25:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2d9da0c2-d396-484c-af4c-d17f7b7da055/export</guid>
      <pubDate>Mon, 01 Feb 2021 19:25:06 +0000</pubDate>
    </item>
  </channel>
</rss>
