<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 20:50:39 +0000</lastBuildDate>
    <item>
      <title>81c46054-35e7-4d2c-b19b-15aef2992b06</title>
      <link>https://vulnerability.circl.lu/sighting/81c46054-35e7-4d2c-b19b-15aef2992b06/export</link>
      <description>{"uuid": "81c46054-35e7-4d2c-b19b-15aef2992b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28674", "type": "seen", "source": "https://t.me/cibsecurity/26598", "content": "\u203c CVE-2021-28674 \u203c\n\nThe node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-30T18:15:26.000000Z"}</description>
      <content:encoded>{"uuid": "81c46054-35e7-4d2c-b19b-15aef2992b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28674", "type": "seen", "source": "https://t.me/cibsecurity/26598", "content": "\u203c CVE-2021-28674 \u203c\n\nThe node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-30T18:15:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/81c46054-35e7-4d2c-b19b-15aef2992b06/export</guid>
      <pubDate>Fri, 30 Jul 2021 18:15:26 +0000</pubDate>
    </item>
  </channel>
</rss>
