<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 02:07:31 +0000</lastBuildDate>
    <item>
      <title>3aa4f761-ef0c-417c-92d0-4766ae72873d</title>
      <link>https://vulnerability.circl.lu/sighting/3aa4f761-ef0c-417c-92d0-4766ae72873d/export</link>
      <description>{"uuid": "3aa4f761-ef0c-417c-92d0-4766ae72873d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37254", "type": "seen", "source": "https://t.me/cibsecurity/31393", "content": "\u203c CVE-2021-37254 \u203c\n\nIn M-Files Web product with versions before 20.10.9524.1 and 20.10.9445.0, a remote attacker could use a flaw to obtain unauthenticated access to 3rd party component license key information on server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-28T18:17:40.000000Z"}</description>
      <content:encoded>{"uuid": "3aa4f761-ef0c-417c-92d0-4766ae72873d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37254", "type": "seen", "source": "https://t.me/cibsecurity/31393", "content": "\u203c CVE-2021-37254 \u203c\n\nIn M-Files Web product with versions before 20.10.9524.1 and 20.10.9445.0, a remote attacker could use a flaw to obtain unauthenticated access to 3rd party component license key information on server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-28T18:17:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3aa4f761-ef0c-417c-92d0-4766ae72873d/export</guid>
      <pubDate>Thu, 28 Oct 2021 18:17:40 +0000</pubDate>
    </item>
    <item>
      <title>7407fc76-6705-44ec-9ec3-aa37dad257fc</title>
      <link>https://vulnerability.circl.lu/sighting/7407fc76-6705-44ec-9ec3-aa37dad257fc/export</link>
      <description>{"uuid": "7407fc76-6705-44ec-9ec3-aa37dad257fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3725", "type": "seen", "source": "https://t.me/cibsecurity/33078", "content": "\u203c CVE-2021-3725 \u203c\n\nVulnerability in dirhistory plugin Description: the widgets that go back and forward in the directory history, triggered by pressing Alt-Left and Alt-Right, use functions that unsafely execute eval on directory names. If you cd into a directory with a carefully-crafted name, then press Alt-Left, the system is subject to command injection. Impacted areas: - Functions pop_past and pop_future in dirhistory plugin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-30T12:34:11.000000Z"}</description>
      <content:encoded>{"uuid": "7407fc76-6705-44ec-9ec3-aa37dad257fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3725", "type": "seen", "source": "https://t.me/cibsecurity/33078", "content": "\u203c CVE-2021-3725 \u203c\n\nVulnerability in dirhistory plugin Description: the widgets that go back and forward in the directory history, triggered by pressing Alt-Left and Alt-Right, use functions that unsafely execute eval on directory names. If you cd into a directory with a carefully-crafted name, then press Alt-Left, the system is subject to command injection. Impacted areas: - Functions pop_past and pop_future in dirhistory plugin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-30T12:34:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7407fc76-6705-44ec-9ec3-aa37dad257fc/export</guid>
      <pubDate>Tue, 30 Nov 2021 12:34:11 +0000</pubDate>
    </item>
    <item>
      <title>705df054-78cf-43cb-940a-6a65e704c140</title>
      <link>https://vulnerability.circl.lu/sighting/705df054-78cf-43cb-940a-6a65e704c140/export</link>
      <description>{"uuid": "705df054-78cf-43cb-940a-6a65e704c140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37253", "type": "seen", "source": "https://t.me/cibsecurity/33349", "content": "\u203c CVE-2021-37253 \u203c\n\nM-Files Web before 20.10.9524.1 allows a denial of service via overlapping ranges (in HTTP requests with crafted Range or Request-Range headers).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-06T00:20:08.000000Z"}</description>
      <content:encoded>{"uuid": "705df054-78cf-43cb-940a-6a65e704c140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37253", "type": "seen", "source": "https://t.me/cibsecurity/33349", "content": "\u203c CVE-2021-37253 \u203c\n\nM-Files Web before 20.10.9524.1 allows a denial of service via overlapping ranges (in HTTP requests with crafted Range or Request-Range headers).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-06T00:20:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/705df054-78cf-43cb-940a-6a65e704c140/export</guid>
      <pubDate>Mon, 06 Dec 2021 00:20:08 +0000</pubDate>
    </item>
  </channel>
</rss>
