<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T06:06:21.299127+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/83752e2a-3dba-4604-b893-346a0b446c92/export</id>
    <title>83752e2a-3dba-4604-b893-346a0b446c92</title>
    <updated>2026-05-11T06:06:21.681741+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "83752e2a-3dba-4604-b893-346a0b446c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40684", "type": "seen", "source": "https://t.me/cibsecurity/29238", "content": "\u203c CVE-2021-40684 \u203c\n\nTalend ESB Runtime in all versions from 5.1 to 7.3.1-R2021-09, 7.2.1-R2021-09, 7.1.1-R2021-09, has an unauthenticated Jolokia HTTP endpoint which allows remote access to the JMX of the runtime container, which would allow an attacker the ability to read or modify the container or software running in the container.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-22T20:28:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/83752e2a-3dba-4604-b893-346a0b446c92/export"/>
    <published>2021-09-22T20:28:59+00:00</published>
  </entry>
</feed>
