<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 01:37:37 +0000</lastBuildDate>
    <item>
      <title>dc1ef310-0911-47eb-9be7-885a17ee44ee</title>
      <link>https://vulnerability.circl.lu/sighting/dc1ef310-0911-47eb-9be7-885a17ee44ee/export</link>
      <description>{"uuid": "dc1ef310-0911-47eb-9be7-885a17ee44ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42713", "type": "seen", "source": "https://t.me/cibsecurity/37529", "content": "\u203c CVE-2021-42713 \u203c\n\nSplashtop Remote Client (Personal Edition) through 3.4.6.1 creates a Temporary File in a Directory with Insecure Permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-15T22:34:43.000000Z"}</description>
      <content:encoded>{"uuid": "dc1ef310-0911-47eb-9be7-885a17ee44ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42713", "type": "seen", "source": "https://t.me/cibsecurity/37529", "content": "\u203c CVE-2021-42713 \u203c\n\nSplashtop Remote Client (Personal Edition) through 3.4.6.1 creates a Temporary File in a Directory with Insecure Permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-15T22:34:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dc1ef310-0911-47eb-9be7-885a17ee44ee/export</guid>
      <pubDate>Tue, 15 Feb 2022 22:34:43 +0000</pubDate>
    </item>
    <item>
      <title>84e55fd5-c9d1-4b2e-a07c-27fcc7afb42c</title>
      <link>https://vulnerability.circl.lu/sighting/84e55fd5-c9d1-4b2e-a07c-27fcc7afb42c/export</link>
      <description>{"uuid": "84e55fd5-c9d1-4b2e-a07c-27fcc7afb42c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42714", "type": "seen", "source": "https://t.me/cibsecurity/37530", "content": "\u203c CVE-2021-42714 \u203c\n\nSplashtop Remote Client (Business Edition) through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-15T22:34:44.000000Z"}</description>
      <content:encoded>{"uuid": "84e55fd5-c9d1-4b2e-a07c-27fcc7afb42c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42714", "type": "seen", "source": "https://t.me/cibsecurity/37530", "content": "\u203c CVE-2021-42714 \u203c\n\nSplashtop Remote Client (Business Edition) through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-15T22:34:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/84e55fd5-c9d1-4b2e-a07c-27fcc7afb42c/export</guid>
      <pubDate>Tue, 15 Feb 2022 22:34:44 +0000</pubDate>
    </item>
    <item>
      <title>7c906186-6a60-47eb-bac8-e088c33b6f22</title>
      <link>https://vulnerability.circl.lu/sighting/7c906186-6a60-47eb-bac8-e088c33b6f22/export</link>
      <description>{"uuid": "7c906186-6a60-47eb-bac8-e088c33b6f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4271", "type": "seen", "source": "https://t.me/cibsecurity/55069", "content": "\u203c CVE-2021-4271 \u203c\n\nA vulnerability was found in panicsteve w2wiki. It has been rated as problematic. Affected by this issue is the function toHTML of the file index.php of the component Markdown Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8f1d0470b4ddb1c7699e3308e765c11ed29542b6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216476.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T22:12:54.000000Z"}</description>
      <content:encoded>{"uuid": "7c906186-6a60-47eb-bac8-e088c33b6f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4271", "type": "seen", "source": "https://t.me/cibsecurity/55069", "content": "\u203c CVE-2021-4271 \u203c\n\nA vulnerability was found in panicsteve w2wiki. It has been rated as problematic. Affected by this issue is the function toHTML of the file index.php of the component Markdown Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8f1d0470b4ddb1c7699e3308e765c11ed29542b6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216476.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T22:12:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c906186-6a60-47eb-bac8-e088c33b6f22/export</guid>
      <pubDate>Wed, 21 Dec 2022 22:12:54 +0000</pubDate>
    </item>
    <item>
      <title>a26f51b7-2a8c-4ab2-bdb7-9f5218851ff6</title>
      <link>https://vulnerability.circl.lu/sighting/a26f51b7-2a8c-4ab2-bdb7-9f5218851ff6/export</link>
      <description>{"uuid": "a26f51b7-2a8c-4ab2-bdb7-9f5218851ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42712", "type": "seen", "source": "https://t.me/arpsyndicate/2727", "content": "#ExploitObserverAlert\n\nCVE-2021-42712\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-42712. Splashtop Streamer through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-09T07:38:03.000000Z"}</description>
      <content:encoded>{"uuid": "a26f51b7-2a8c-4ab2-bdb7-9f5218851ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42712", "type": "seen", "source": "https://t.me/arpsyndicate/2727", "content": "#ExploitObserverAlert\n\nCVE-2021-42712\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-42712. Splashtop Streamer through 3.4.8.3 creates a Temporary File in a Directory with Insecure Permissions.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-09T07:38:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a26f51b7-2a8c-4ab2-bdb7-9f5218851ff6/export</guid>
      <pubDate>Tue, 09 Jan 2024 07:38:03 +0000</pubDate>
    </item>
    <item>
      <title>6fdc88e0-1c80-47c8-9dbc-dc45f77867c1</title>
      <link>https://vulnerability.circl.lu/sighting/6fdc88e0-1c80-47c8-9dbc-dc45f77867c1/export</link>
      <description>{"uuid": "6fdc88e0-1c80-47c8-9dbc-dc45f77867c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-42718", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113880117056907269", "content": "", "creation_timestamp": "2025-01-23T22:51:25.071589Z"}</description>
      <content:encoded>{"uuid": "6fdc88e0-1c80-47c8-9dbc-dc45f77867c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-42718", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113880117056907269", "content": "", "creation_timestamp": "2025-01-23T22:51:25.071589Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6fdc88e0-1c80-47c8-9dbc-dc45f77867c1/export</guid>
      <pubDate>Thu, 23 Jan 2025 22:51:25 +0000</pubDate>
    </item>
    <item>
      <title>0aa6282f-ea10-4308-9b59-928b73c3f6d0</title>
      <link>https://vulnerability.circl.lu/sighting/0aa6282f-ea10-4308-9b59-928b73c3f6d0/export</link>
      <description>{"uuid": "0aa6282f-ea10-4308-9b59-928b73c3f6d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2850", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-42718\n\ud83d\udd39 Description: Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.\n\nThis CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.\n\nSummary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (\u201cAffected Replicated Classic Versions\u201d)\n\nDescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.\n\nThis data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.\n\nTimelineThis issue was discovered during a security review on 16 September 2021.\nPatched versions were released on 23 September 2021.\nThis advisory was published on 21 October 2021.\n\n\nThe CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025.\n\ud83d\udccf Published: 2025-01-23T22:45:37.185Z\n\ud83d\udccf Modified: 2025-01-23T22:45:37.185Z\n\ud83d\udd17 References:\n1. https://www.replicated.com/cve-2021-42718", "creation_timestamp": "2025-01-23T23:03:49.000000Z"}</description>
      <content:encoded>{"uuid": "0aa6282f-ea10-4308-9b59-928b73c3f6d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2850", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-42718\n\ud83d\udd39 Description: Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.\n\nThis CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.\n\nSummary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (\u201cAffected Replicated Classic Versions\u201d)\n\nDescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.\n\nThis data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.\n\nTimelineThis issue was discovered during a security review on 16 September 2021.\nPatched versions were released on 23 September 2021.\nThis advisory was published on 21 October 2021.\n\n\nThe CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025.\n\ud83d\udccf Published: 2025-01-23T22:45:37.185Z\n\ud83d\udccf Modified: 2025-01-23T22:45:37.185Z\n\ud83d\udd17 References:\n1. https://www.replicated.com/cve-2021-42718", "creation_timestamp": "2025-01-23T23:03:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0aa6282f-ea10-4308-9b59-928b73c3f6d0/export</guid>
      <pubDate>Thu, 23 Jan 2025 23:03:49 +0000</pubDate>
    </item>
    <item>
      <title>90acdf85-7258-42f2-88f8-3866d26ff1a3</title>
      <link>https://vulnerability.circl.lu/sighting/90acdf85-7258-42f2-88f8-3866d26ff1a3/export</link>
      <description>{"uuid": "90acdf85-7258-42f2-88f8-3866d26ff1a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggz6vptvz2e", "content": "", "creation_timestamp": "2025-01-23T23:15:38.943262Z"}</description>
      <content:encoded>{"uuid": "90acdf85-7258-42f2-88f8-3866d26ff1a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggz6vptvz2e", "content": "", "creation_timestamp": "2025-01-23T23:15:38.943262Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/90acdf85-7258-42f2-88f8-3866d26ff1a3/export</guid>
      <pubDate>Thu, 23 Jan 2025 23:15:38 +0000</pubDate>
    </item>
    <item>
      <title>7fe8f1b0-0572-4501-a46c-557014ac2849</title>
      <link>https://vulnerability.circl.lu/sighting/7fe8f1b0-0572-4501-a46c-557014ac2849/export</link>
      <description>{"uuid": "7fe8f1b0-0572-4501-a46c-557014ac2849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g3ijrg2e", "content": "", "creation_timestamp": "2025-01-23T23:55:33.006298Z"}</description>
      <content:encoded>{"uuid": "7fe8f1b0-0572-4501-a46c-557014ac2849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g3ijrg2e", "content": "", "creation_timestamp": "2025-01-23T23:55:33.006298Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7fe8f1b0-0572-4501-a46c-557014ac2849/export</guid>
      <pubDate>Thu, 23 Jan 2025 23:55:33 +0000</pubDate>
    </item>
    <item>
      <title>2f2e7c1c-9a0d-4699-bf90-66168500525c</title>
      <link>https://vulnerability.circl.lu/sighting/2f2e7c1c-9a0d-4699-bf90-66168500525c/export</link>
      <description>{"uuid": "2f2e7c1c-9a0d-4699-bf90-66168500525c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://t.me/cvedetector/16247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-42718 - Replicated Classic API Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2021-42718 \nPublished : Jan. 23, 2025, 11:15 p.m. | 35\u00a0minutes ago \nDescription : Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.  \n  \nThis CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.  \n  \nSummary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (\u201cAffected Replicated Classic Versions\u201d)  \n  \nDescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.  \n  \nThis data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.  \n  \nTimelineThis issue was discovered during a security review on 16 September 2021.  \nPatched versions were released on 23 September 2021.  \nThis advisory was published on 21 October 2021.  \n  \n  \nThe CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T01:00:33.000000Z"}</description>
      <content:encoded>{"uuid": "2f2e7c1c-9a0d-4699-bf90-66168500525c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42718", "type": "seen", "source": "https://t.me/cvedetector/16247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-42718 - Replicated Classic API Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2021-42718 \nPublished : Jan. 23, 2025, 11:15 p.m. | 35\u00a0minutes ago \nDescription : Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.  \n  \nThis CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.  \n  \nSummary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (\u201cAffected Replicated Classic Versions\u201d)  \n  \nDescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.  \n  \nThis data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.  \n  \nTimelineThis issue was discovered during a security review on 16 September 2021.  \nPatched versions were released on 23 September 2021.  \nThis advisory was published on 21 October 2021.  \n  \n  \nThe CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T01:00:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2f2e7c1c-9a0d-4699-bf90-66168500525c/export</guid>
      <pubDate>Fri, 24 Jan 2025 01:00:33 +0000</pubDate>
    </item>
    <item>
      <title>c1bfc40a-3b80-4543-8d10-2e8f3dc1fb0d</title>
      <link>https://vulnerability.circl.lu/sighting/c1bfc40a-3b80-4543-8d10-2e8f3dc1fb0d/export</link>
      <description>{"uuid": "c1bfc40a-3b80-4543-8d10-2e8f3dc1fb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4271", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-4271\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability was found in panicsteve w2wiki. It has been rated as problematic. Affected by this issue is the function toHTML of the file index.php of the component Markdown Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8f1d0470b4ddb1c7699e3308e765c11ed29542b6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216476.\n\ud83d\udccf Published: 2022-12-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-14T17:29:14.184Z\n\ud83d\udd17 References:\n1. https://github.com/panicsteve/w2wiki/commit/8f1d0470b4ddb1c7699e3308e765c11ed29542b6\n2. https://vuldb.com/?id.216476", "creation_timestamp": "2025-04-14T17:54:35.000000Z"}</description>
      <content:encoded>{"uuid": "c1bfc40a-3b80-4543-8d10-2e8f3dc1fb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4271", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-4271\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability was found in panicsteve w2wiki. It has been rated as problematic. Affected by this issue is the function toHTML of the file index.php of the component Markdown Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8f1d0470b4ddb1c7699e3308e765c11ed29542b6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216476.\n\ud83d\udccf Published: 2022-12-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-14T17:29:14.184Z\n\ud83d\udd17 References:\n1. https://github.com/panicsteve/w2wiki/commit/8f1d0470b4ddb1c7699e3308e765c11ed29542b6\n2. https://vuldb.com/?id.216476", "creation_timestamp": "2025-04-14T17:54:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1bfc40a-3b80-4543-8d10-2e8f3dc1fb0d/export</guid>
      <pubDate>Mon, 14 Apr 2025 17:54:35 +0000</pubDate>
    </item>
  </channel>
</rss>
