<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:01:45 +0000</lastBuildDate>
    <item>
      <title>7bae47f6-cea0-4bc9-85bd-b071231c1183</title>
      <link>https://vulnerability.circl.lu/sighting/7bae47f6-cea0-4bc9-85bd-b071231c1183/export</link>
      <description>{"uuid": "7bae47f6-cea0-4bc9-85bd-b071231c1183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25837", "type": "seen", "source": "https://t.me/cibsecurity/23225", "content": "\u203c CVE-2021-25837 \u203c\n\nCosmos Network Ethermint &amp;lt;= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. Due to the inconsistency between the Storage caching cycle and the Tx processing cycle, Storage changes caused by a failed transaction are improperly reserved in memory. Although the bad storage cache data will be discarded at EndBlock, it is still valid in the current block, which enables many possible attacks such as an \"arbitrary mint token\".\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-08T20:39:35.000000Z"}</description>
      <content:encoded>{"uuid": "7bae47f6-cea0-4bc9-85bd-b071231c1183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25837", "type": "seen", "source": "https://t.me/cibsecurity/23225", "content": "\u203c CVE-2021-25837 \u203c\n\nCosmos Network Ethermint &amp;lt;= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. Due to the inconsistency between the Storage caching cycle and the Tx processing cycle, Storage changes caused by a failed transaction are improperly reserved in memory. Although the bad storage cache data will be discarded at EndBlock, it is still valid in the current block, which enables many possible attacks such as an \"arbitrary mint token\".\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-08T20:39:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7bae47f6-cea0-4bc9-85bd-b071231c1183/export</guid>
      <pubDate>Mon, 08 Feb 2021 20:39:35 +0000</pubDate>
    </item>
  </channel>
</rss>
