<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 08:46:46 +0000</lastBuildDate>
    <item>
      <title>b1496fd0-6820-4b8b-a21b-b153d74493e8</title>
      <link>https://vulnerability.circl.lu/sighting/b1496fd0-6820-4b8b-a21b-b153d74493e8/export</link>
      <description>{"uuid": "b1496fd0-6820-4b8b-a21b-b153d74493e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37794", "type": "seen", "source": "https://t.me/cibsecurity/28132", "content": "\u203c CVE-2021-37794 \u203c\n\nA stored cross-site scripting (XSS) vulnerability exists in FileBrowser &amp;lt; v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T22:33:42.000000Z"}</description>
      <content:encoded>{"uuid": "b1496fd0-6820-4b8b-a21b-b153d74493e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37794", "type": "seen", "source": "https://t.me/cibsecurity/28132", "content": "\u203c CVE-2021-37794 \u203c\n\nA stored cross-site scripting (XSS) vulnerability exists in FileBrowser &amp;lt; v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T22:33:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1496fd0-6820-4b8b-a21b-b153d74493e8/export</guid>
      <pubDate>Tue, 31 Aug 2021 22:33:42 +0000</pubDate>
    </item>
  </channel>
</rss>
