<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 06:50:32 +0000</lastBuildDate>
    <item>
      <title>011c18a3-dbe2-472c-a939-bc8936d31017</title>
      <link>https://vulnerability.circl.lu/sighting/011c18a3-dbe2-472c-a939-bc8936d31017/export</link>
      <description>{"uuid": "011c18a3-dbe2-472c-a939-bc8936d31017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44662", "type": "seen", "source": "https://t.me/cibsecurity/38045", "content": "\u203c CVE-2021-44662 \u203c\n\nA Site Scripting (XSS) vulnerability exists in the Xerte Project Xerte through 3.8.4 via the link parameter in print.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:14:56.000000Z"}</description>
      <content:encoded>{"uuid": "011c18a3-dbe2-472c-a939-bc8936d31017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44662", "type": "seen", "source": "https://t.me/cibsecurity/38045", "content": "\u203c CVE-2021-44662 \u203c\n\nA Site Scripting (XSS) vulnerability exists in the Xerte Project Xerte through 3.8.4 via the link parameter in print.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:14:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/011c18a3-dbe2-472c-a939-bc8936d31017/export</guid>
      <pubDate>Thu, 24 Feb 2022 22:14:56 +0000</pubDate>
    </item>
    <item>
      <title>97530ecf-0b0f-43bc-b155-c73d83ca5f0b</title>
      <link>https://vulnerability.circl.lu/sighting/97530ecf-0b0f-43bc-b155-c73d83ca5f0b/export</link>
      <description>{"uuid": "97530ecf-0b0f-43bc-b155-c73d83ca5f0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44663", "type": "seen", "source": "https://t.me/cibsecurity/38052", "content": "\u203c CVE-2021-44663 \u203c\n\nA Remote Code Execution (RCE) vulnerability exists in the Xerte Project Xerte through 3.8.4 via a crafted php file through elfinder in connetor.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:15:08.000000Z"}</description>
      <content:encoded>{"uuid": "97530ecf-0b0f-43bc-b155-c73d83ca5f0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44663", "type": "seen", "source": "https://t.me/cibsecurity/38052", "content": "\u203c CVE-2021-44663 \u203c\n\nA Remote Code Execution (RCE) vulnerability exists in the Xerte Project Xerte through 3.8.4 via a crafted php file through elfinder in connetor.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T22:15:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/97530ecf-0b0f-43bc-b155-c73d83ca5f0b/export</guid>
      <pubDate>Thu, 24 Feb 2022 22:15:08 +0000</pubDate>
    </item>
    <item>
      <title>154e71e0-145a-4662-af73-e3f18ff04aae</title>
      <link>https://vulnerability.circl.lu/sighting/154e71e0-145a-4662-af73-e3f18ff04aae/export</link>
      <description>{"uuid": "154e71e0-145a-4662-af73-e3f18ff04aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44664", "type": "seen", "source": "https://t.me/cibsecurity/38060", "content": "\u203c CVE-2021-44664 \u203c\n\nAn Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T00:20:00.000000Z"}</description>
      <content:encoded>{"uuid": "154e71e0-145a-4662-af73-e3f18ff04aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44664", "type": "seen", "source": "https://t.me/cibsecurity/38060", "content": "\u203c CVE-2021-44664 \u203c\n\nAn Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T00:20:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/154e71e0-145a-4662-af73-e3f18ff04aae/export</guid>
      <pubDate>Fri, 25 Feb 2022 00:20:00 +0000</pubDate>
    </item>
    <item>
      <title>131fb18e-cf38-4c33-8407-32f17731ee07</title>
      <link>https://vulnerability.circl.lu/sighting/131fb18e-cf38-4c33-8407-32f17731ee07/export</link>
      <description>{"uuid": "131fb18e-cf38-4c33-8407-32f17731ee07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44665", "type": "seen", "source": "https://t.me/cibsecurity/38067", "content": "\u203c CVE-2021-44665 \u203c\n\nA Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T00:20:19.000000Z"}</description>
      <content:encoded>{"uuid": "131fb18e-cf38-4c33-8407-32f17731ee07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44665", "type": "seen", "source": "https://t.me/cibsecurity/38067", "content": "\u203c CVE-2021-44665 \u203c\n\nA Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T00:20:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/131fb18e-cf38-4c33-8407-32f17731ee07/export</guid>
      <pubDate>Fri, 25 Feb 2022 00:20:19 +0000</pubDate>
    </item>
    <item>
      <title>059086be-a03a-403d-bcb5-c6ecd712da37</title>
      <link>https://vulnerability.circl.lu/sighting/059086be-a03a-403d-bcb5-c6ecd712da37/export</link>
      <description>{"uuid": "059086be-a03a-403d-bcb5-c6ecd712da37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44667", "type": "seen", "source": "https://t.me/cibsecurity/38827", "content": "\u203c CVE-2021-44667 \u203c\n\nA Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-11T22:21:12.000000Z"}</description>
      <content:encoded>{"uuid": "059086be-a03a-403d-bcb5-c6ecd712da37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44667", "type": "seen", "source": "https://t.me/cibsecurity/38827", "content": "\u203c CVE-2021-44667 \u203c\n\nA Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-11T22:21:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/059086be-a03a-403d-bcb5-c6ecd712da37/export</guid>
      <pubDate>Fri, 11 Mar 2022 22:21:12 +0000</pubDate>
    </item>
    <item>
      <title>2aab6d29-462c-4183-981f-5416bf1b32d8</title>
      <link>https://vulnerability.circl.lu/sighting/2aab6d29-462c-4183-981f-5416bf1b32d8/export</link>
      <description>{"uuid": "2aab6d29-462c-4183-981f-5416bf1b32d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44667", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwmrsapw2w26", "content": "", "creation_timestamp": "2025-08-17T21:02:25.947757Z"}</description>
      <content:encoded>{"uuid": "2aab6d29-462c-4183-981f-5416bf1b32d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44667", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwmrsapw2w26", "content": "", "creation_timestamp": "2025-08-17T21:02:25.947757Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2aab6d29-462c-4183-981f-5416bf1b32d8/export</guid>
      <pubDate>Sun, 17 Aug 2025 21:02:25 +0000</pubDate>
    </item>
  </channel>
</rss>
