<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T08:51:01.282904+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/41361a07-1e58-4f65-ad15-12717eefadf6/export</id>
    <title>41361a07-1e58-4f65-ad15-12717eefadf6</title>
    <updated>2026-05-09T08:51:01.743330+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "41361a07-1e58-4f65-ad15-12717eefadf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22261", "type": "seen", "source": "https://t.me/cibsecurity/29983", "content": "\u203c CVE-2021-22261 \u203c\n\nA stored Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious Jira API responses\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T18:30:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/41361a07-1e58-4f65-ad15-12717eefadf6/export"/>
    <published>2021-10-05T18:30:31+00:00</published>
  </entry>
</feed>
