<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 08:23:12 +0000</lastBuildDate>
    <item>
      <title>22ab1829-ba34-4666-b483-4e76a28e2e75</title>
      <link>https://vulnerability.circl.lu/sighting/22ab1829-ba34-4666-b483-4e76a28e2e75/export</link>
      <description>{"uuid": "22ab1829-ba34-4666-b483-4e76a28e2e75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40095", "type": "seen", "source": "https://t.me/cibsecurity/33438", "content": "\u203c CVE-2021-40095 \u203c\n\nAn issue was discovered in SquaredUp for SCOM 5.2.1.6654. The Download Log feature in System / Maintenance was susceptible to a local file inclusion vulnerability (when processing remote input in the log files downloaded by an authenticated administrator user), leading to the ability to read arbitrary files on the server filesystems.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T16:21:42.000000Z"}</description>
      <content:encoded>{"uuid": "22ab1829-ba34-4666-b483-4e76a28e2e75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40095", "type": "seen", "source": "https://t.me/cibsecurity/33438", "content": "\u203c CVE-2021-40095 \u203c\n\nAn issue was discovered in SquaredUp for SCOM 5.2.1.6654. The Download Log feature in System / Maintenance was susceptible to a local file inclusion vulnerability (when processing remote input in the log files downloaded by an authenticated administrator user), leading to the ability to read arbitrary files on the server filesystems.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T16:21:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/22ab1829-ba34-4666-b483-4e76a28e2e75/export</guid>
      <pubDate>Tue, 07 Dec 2021 16:21:42 +0000</pubDate>
    </item>
  </channel>
</rss>
