<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 00:32:48 +0000</lastBuildDate>
    <item>
      <title>4d564bb1-3e51-4ff8-aee7-031972c824ab</title>
      <link>https://vulnerability.circl.lu/sighting/4d564bb1-3e51-4ff8-aee7-031972c824ab/export</link>
      <description>{"uuid": "4d564bb1-3e51-4ff8-aee7-031972c824ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36298", "type": "seen", "source": "https://t.me/cibsecurity/29849", "content": "\u203c CVE-2021-36298 \u203c\n\nDell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-02T00:29:59.000000Z"}</description>
      <content:encoded>{"uuid": "4d564bb1-3e51-4ff8-aee7-031972c824ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36298", "type": "seen", "source": "https://t.me/cibsecurity/29849", "content": "\u203c CVE-2021-36298 \u203c\n\nDell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-02T00:29:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4d564bb1-3e51-4ff8-aee7-031972c824ab/export</guid>
      <pubDate>Sat, 02 Oct 2021 00:29:59 +0000</pubDate>
    </item>
  </channel>
</rss>
