<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 11:12:48 +0000</lastBuildDate>
    <item>
      <title>b1e9c255-8e5d-45f9-ae5f-8ce309355944</title>
      <link>https://vulnerability.circl.lu/sighting/b1e9c255-8e5d-45f9-ae5f-8ce309355944/export</link>
      <description>{"uuid": "b1e9c255-8e5d-45f9-ae5f-8ce309355944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35397", "type": "seen", "source": "https://t.me/cibsecurity/26791", "content": "\u203c CVE-2021-35397 \u203c\n\nA path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T15:23:19.000000Z"}</description>
      <content:encoded>{"uuid": "b1e9c255-8e5d-45f9-ae5f-8ce309355944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35397", "type": "seen", "source": "https://t.me/cibsecurity/26791", "content": "\u203c CVE-2021-35397 \u203c\n\nA path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T15:23:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1e9c255-8e5d-45f9-ae5f-8ce309355944/export</guid>
      <pubDate>Wed, 04 Aug 2021 15:23:19 +0000</pubDate>
    </item>
  </channel>
</rss>
