<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 15:46:44 +0000</lastBuildDate>
    <item>
      <title>dce5d586-84ed-4bc5-b985-f4cc673cf6dc</title>
      <link>https://vulnerability.circl.lu/sighting/dce5d586-84ed-4bc5-b985-f4cc673cf6dc/export</link>
      <description>{"uuid": "dce5d586-84ed-4bc5-b985-f4cc673cf6dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38707", "type": "seen", "source": "https://t.me/cibsecurity/28392", "content": "\u203c CVE-2021-38707 \u203c\n\nPersistent cross-site scripting (XSS) vulnerabilities in ClinicCases 7.3.3 allow low-privileged attackers to introduce arbitrary JavaScript to account parameters. The XSS payloads will execute in the browser of any user who views the relevant content. This can result in account takeover via session token theft.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T00:22:51.000000Z"}</description>
      <content:encoded>{"uuid": "dce5d586-84ed-4bc5-b985-f4cc673cf6dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38707", "type": "seen", "source": "https://t.me/cibsecurity/28392", "content": "\u203c CVE-2021-38707 \u203c\n\nPersistent cross-site scripting (XSS) vulnerabilities in ClinicCases 7.3.3 allow low-privileged attackers to introduce arbitrary JavaScript to account parameters. The XSS payloads will execute in the browser of any user who views the relevant content. This can result in account takeover via session token theft.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T00:22:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dce5d586-84ed-4bc5-b985-f4cc673cf6dc/export</guid>
      <pubDate>Wed, 08 Sep 2021 00:22:51 +0000</pubDate>
    </item>
  </channel>
</rss>
