<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 08:54:55 +0000</lastBuildDate>
    <item>
      <title>d72087a6-5338-4d78-a007-9407e51ea137</title>
      <link>https://vulnerability.circl.lu/sighting/d72087a6-5338-4d78-a007-9407e51ea137/export</link>
      <description>{"uuid": "d72087a6-5338-4d78-a007-9407e51ea137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41286", "type": "seen", "source": "https://t.me/cibsecurity/29994", "content": "\u203c CVE-2021-41286 \u203c\n\nOmikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T20:30:36.000000Z"}</description>
      <content:encoded>{"uuid": "d72087a6-5338-4d78-a007-9407e51ea137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41286", "type": "seen", "source": "https://t.me/cibsecurity/29994", "content": "\u203c CVE-2021-41286 \u203c\n\nOmikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T20:30:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d72087a6-5338-4d78-a007-9407e51ea137/export</guid>
      <pubDate>Tue, 05 Oct 2021 20:30:36 +0000</pubDate>
    </item>
  </channel>
</rss>
