<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T15:46:52.302389+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5ee19e05-5492-4cd4-8102-6981d49ddfb1/export</id>
    <title>5ee19e05-5492-4cd4-8102-6981d49ddfb1</title>
    <updated>2026-05-09T15:46:52.691116+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5ee19e05-5492-4cd4-8102-6981d49ddfb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37270", "type": "seen", "source": "https://t.me/cibsecurity/29525", "content": "\u203c CVE-2021-37270 \u203c\n\nThere is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-28T00:34:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5ee19e05-5492-4cd4-8102-6981d49ddfb1/export"/>
    <published>2021-09-28T00:34:58+00:00</published>
  </entry>
</feed>
