<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:35:45 +0000</lastBuildDate>
    <item>
      <title>2925290b-b854-43e2-a32b-bb227934e95f</title>
      <link>https://vulnerability.circl.lu/sighting/2925290b-b854-43e2-a32b-bb227934e95f/export</link>
      <description>{"uuid": "2925290b-b854-43e2-a32b-bb227934e95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36758", "type": "seen", "source": "https://t.me/cibsecurity/26207", "content": "\u203c CVE-2021-36758 \u203c\n\n1Password Connect server before 1.2 is missing validation checks, permitting users to create Secrets Automation access tokens that can be used to perform privilege escalation. Malicious users authorized to create Secrets Automation access tokens can create tokens that have access beyond what the user is authorized to access, but limited to the existing authorizations of the Secret Automation the token is created in.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-16T07:27:35.000000Z"}</description>
      <content:encoded>{"uuid": "2925290b-b854-43e2-a32b-bb227934e95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36758", "type": "seen", "source": "https://t.me/cibsecurity/26207", "content": "\u203c CVE-2021-36758 \u203c\n\n1Password Connect server before 1.2 is missing validation checks, permitting users to create Secrets Automation access tokens that can be used to perform privilege escalation. Malicious users authorized to create Secrets Automation access tokens can create tokens that have access beyond what the user is authorized to access, but limited to the existing authorizations of the Secret Automation the token is created in.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-16T07:27:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2925290b-b854-43e2-a32b-bb227934e95f/export</guid>
      <pubDate>Fri, 16 Jul 2021 07:27:35 +0000</pubDate>
    </item>
  </channel>
</rss>
