<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 17:40:56 +0000</lastBuildDate>
    <item>
      <title>4d83c5b0-cbbd-4983-bd5f-e53ea7a66535</title>
      <link>https://vulnerability.circl.lu/sighting/4d83c5b0-cbbd-4983-bd5f-e53ea7a66535/export</link>
      <description>{"uuid": "4d83c5b0-cbbd-4983-bd5f-e53ea7a66535", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42635", "type": "seen", "source": "https://t.me/cibsecurity/36596", "content": "\u203c CVE-2021-42635 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-31T20:25:29.000000Z"}</description>
      <content:encoded>{"uuid": "4d83c5b0-cbbd-4983-bd5f-e53ea7a66535", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42635", "type": "seen", "source": "https://t.me/cibsecurity/36596", "content": "\u203c CVE-2021-42635 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-31T20:25:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4d83c5b0-cbbd-4983-bd5f-e53ea7a66535/export</guid>
      <pubDate>Mon, 31 Jan 2022 20:25:29 +0000</pubDate>
    </item>
    <item>
      <title>df56cb3a-a1ee-46e0-ac54-757ee3b9eaa6</title>
      <link>https://vulnerability.circl.lu/sighting/df56cb3a-a1ee-46e0-ac54-757ee3b9eaa6/export</link>
      <description>{"uuid": "df56cb3a-a1ee-46e0-ac54-757ee3b9eaa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42631", "type": "seen", "source": "https://t.me/cibsecurity/36598", "content": "\u203c CVE-2021-42631 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-31T20:25:31.000000Z"}</description>
      <content:encoded>{"uuid": "df56cb3a-a1ee-46e0-ac54-757ee3b9eaa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42631", "type": "seen", "source": "https://t.me/cibsecurity/36598", "content": "\u203c CVE-2021-42631 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-31T20:25:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/df56cb3a-a1ee-46e0-ac54-757ee3b9eaa6/export</guid>
      <pubDate>Mon, 31 Jan 2022 20:25:31 +0000</pubDate>
    </item>
    <item>
      <title>6b5335ff-3548-4c55-b3ae-76c07aeebb83</title>
      <link>https://vulnerability.circl.lu/sighting/6b5335ff-3548-4c55-b3ae-76c07aeebb83/export</link>
      <description>{"uuid": "6b5335ff-3548-4c55-b3ae-76c07aeebb83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42638", "type": "seen", "source": "https://t.me/cibsecurity/36678", "content": "\u203c CVE-2021-42638 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T02:26:57.000000Z"}</description>
      <content:encoded>{"uuid": "6b5335ff-3548-4c55-b3ae-76c07aeebb83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42638", "type": "seen", "source": "https://t.me/cibsecurity/36678", "content": "\u203c CVE-2021-42638 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T02:26:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6b5335ff-3548-4c55-b3ae-76c07aeebb83/export</guid>
      <pubDate>Wed, 02 Feb 2022 02:26:57 +0000</pubDate>
    </item>
    <item>
      <title>4f4e0bd2-de70-41b5-9fa7-6e8102587987</title>
      <link>https://vulnerability.circl.lu/sighting/4f4e0bd2-de70-41b5-9fa7-6e8102587987/export</link>
      <description>{"uuid": "4f4e0bd2-de70-41b5-9fa7-6e8102587987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42633", "type": "seen", "source": "https://t.me/cibsecurity/36716", "content": "\u203c CVE-2021-42633 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T20:29:00.000000Z"}</description>
      <content:encoded>{"uuid": "4f4e0bd2-de70-41b5-9fa7-6e8102587987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42633", "type": "seen", "source": "https://t.me/cibsecurity/36716", "content": "\u203c CVE-2021-42633 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T20:29:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4f4e0bd2-de70-41b5-9fa7-6e8102587987/export</guid>
      <pubDate>Wed, 02 Feb 2022 20:29:00 +0000</pubDate>
    </item>
    <item>
      <title>a878ba85-a941-49a2-a199-a87708a13b05</title>
      <link>https://vulnerability.circl.lu/sighting/a878ba85-a941-49a2-a199-a87708a13b05/export</link>
      <description>{"uuid": "a878ba85-a941-49a2-a199-a87708a13b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42639", "type": "seen", "source": "https://t.me/cibsecurity/36718", "content": "\u203c CVE-2021-42639 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T20:29:03.000000Z"}</description>
      <content:encoded>{"uuid": "a878ba85-a941-49a2-a199-a87708a13b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42639", "type": "seen", "source": "https://t.me/cibsecurity/36718", "content": "\u203c CVE-2021-42639 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T20:29:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a878ba85-a941-49a2-a199-a87708a13b05/export</guid>
      <pubDate>Wed, 02 Feb 2022 20:29:03 +0000</pubDate>
    </item>
    <item>
      <title>f66bbb12-de18-4115-82ee-30bf27562c5c</title>
      <link>https://vulnerability.circl.lu/sighting/f66bbb12-de18-4115-82ee-30bf27562c5c/export</link>
      <description>{"uuid": "f66bbb12-de18-4115-82ee-30bf27562c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42637", "type": "seen", "source": "https://t.me/cibsecurity/36719", "content": "\u203c CVE-2021-42637 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T20:29:04.000000Z"}</description>
      <content:encoded>{"uuid": "f66bbb12-de18-4115-82ee-30bf27562c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42637", "type": "seen", "source": "https://t.me/cibsecurity/36719", "content": "\u203c CVE-2021-42637 \u203c\n\nPrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T20:29:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f66bbb12-de18-4115-82ee-30bf27562c5c/export</guid>
      <pubDate>Wed, 02 Feb 2022 20:29:04 +0000</pubDate>
    </item>
    <item>
      <title>ffce5ab9-b854-4615-abb6-33e653ac1a0c</title>
      <link>https://vulnerability.circl.lu/sighting/ffce5ab9-b854-4615-abb6-33e653ac1a0c/export</link>
      <description>{"uuid": "ffce5ab9-b854-4615-abb6-33e653ac1a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4263", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11664", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-4263\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability.\n\ud83d\udccf Published: 2022-12-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-14T17:30:21.115Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.216461\n2. https://vuldb.com/?ctiid.216461\n3. https://github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19", "creation_timestamp": "2025-04-14T17:54:26.000000Z"}</description>
      <content:encoded>{"uuid": "ffce5ab9-b854-4615-abb6-33e653ac1a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4263", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11664", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-4263\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability.\n\ud83d\udccf Published: 2022-12-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-14T17:30:21.115Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.216461\n2. https://vuldb.com/?ctiid.216461\n3. https://github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19", "creation_timestamp": "2025-04-14T17:54:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ffce5ab9-b854-4615-abb6-33e653ac1a0c/export</guid>
      <pubDate>Mon, 14 Apr 2025 17:54:26 +0000</pubDate>
    </item>
  </channel>
</rss>
