<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 19:45:53 +0000</lastBuildDate>
    <item>
      <title>50f26d79-8336-4cbd-9841-8cdd57c75a39</title>
      <link>https://vulnerability.circl.lu/sighting/50f26d79-8336-4cbd-9841-8cdd57c75a39/export</link>
      <description>{"uuid": "50f26d79-8336-4cbd-9841-8cdd57c75a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37223", "type": "seen", "source": "https://t.me/cibsecurity/29962", "content": "\u203c CVE-2021-37223 \u203c\n\nNagios Enterprises NagiosXI &amp;lt;= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any authenticated user can create scheduled reports containing PDF screenshots of any view in the NagiosXI application. Due to lack of input sanitisation, the target page can be replaced with an SSRF payload to access internal resources or disclose local system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T16:30:32.000000Z"}</description>
      <content:encoded>{"uuid": "50f26d79-8336-4cbd-9841-8cdd57c75a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37223", "type": "seen", "source": "https://t.me/cibsecurity/29962", "content": "\u203c CVE-2021-37223 \u203c\n\nNagios Enterprises NagiosXI &amp;lt;= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any authenticated user can create scheduled reports containing PDF screenshots of any view in the NagiosXI application. Due to lack of input sanitisation, the target page can be replaced with an SSRF payload to access internal resources or disclose local system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T16:30:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/50f26d79-8336-4cbd-9841-8cdd57c75a39/export</guid>
      <pubDate>Tue, 05 Oct 2021 16:30:32 +0000</pubDate>
    </item>
  </channel>
</rss>
