<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T04:08:54.641790+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30c6b592-0ae1-4854-b943-73056cc505f8/export</id>
    <title>30c6b592-0ae1-4854-b943-73056cc505f8</title>
    <updated>2026-05-09T04:08:55.040095+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30c6b592-0ae1-4854-b943-73056cc505f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22262", "type": "seen", "source": "https://t.me/cibsecurity/29980", "content": "\u203c CVE-2021-22262 \u203c\n\nMissing access control in GitLab version 13.10 and above with Jira Cloud integration enabled allows Jira users without administrative privileges to add and remove Jira Connect Namespaces via the GitLab.com for Jira Cloud application configuration page\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T18:30:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30c6b592-0ae1-4854-b943-73056cc505f8/export"/>
    <published>2021-10-05T18:30:28+00:00</published>
  </entry>
</feed>
