<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T12:03:52.879355+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e06501fb-89f4-46f0-9067-a70a9dc3ed50/export</id>
    <title>e06501fb-89f4-46f0-9067-a70a9dc3ed50</title>
    <updated>2026-05-09T12:03:53.222713+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e06501fb-89f4-46f0-9067-a70a9dc3ed50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43064", "type": "seen", "source": "https://t.me/cibsecurity/33576", "content": "\u203c CVE-2021-43064 \u203c\n\nA url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e06501fb-89f4-46f0-9067-a70a9dc3ed50/export"/>
    <published>2021-12-08T16:22:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b60fda04-3a53-4b12-9f40-5c3088d49a66/export</id>
    <title>b60fda04-3a53-4b12-9f40-5c3088d49a66</title>
    <updated>2026-05-09T12:03:53.222605+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b60fda04-3a53-4b12-9f40-5c3088d49a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43063", "type": "seen", "source": "https://t.me/cibsecurity/33577", "content": "\u203c CVE-2021-43063 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b60fda04-3a53-4b12-9f40-5c3088d49a66/export"/>
    <published>2021-12-08T16:22:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c56b76a4-682d-44d2-9885-27a334cd266b/export</id>
    <title>c56b76a4-682d-44d2-9885-27a334cd266b</title>
    <updated>2026-05-09T12:03:53.222503+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c56b76a4-682d-44d2-9885-27a334cd266b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43062", "type": "seen", "source": "https://t.me/cibsecurity/36693", "content": "\u203c CVE-2021-43062 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T14:28:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c56b76a4-682d-44d2-9885-27a334cd266b/export"/>
    <published>2022-02-02T14:28:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4fe656b2-46c9-468b-803a-0abf5d323fa2/export</id>
    <title>4fe656b2-46c9-468b-803a-0abf5d323fa2</title>
    <updated>2026-05-09T12:03:53.222399+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4fe656b2-46c9-468b-803a-0abf5d323fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43066", "type": "seen", "source": "https://t.me/cibsecurity/42400", "content": "\u203c CVE-2021-43066 \u203c\n\nA external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T20:34:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4fe656b2-46c9-468b-803a-0abf5d323fa2/export"/>
    <published>2022-05-11T20:34:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b63dbf22-a779-40a2-a76d-4f29588a5d16/export</id>
    <title>b63dbf22-a779-40a2-a76d-4f29588a5d16</title>
    <updated>2026-05-09T12:03:53.222250+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b63dbf22-a779-40a2-a76d-4f29588a5d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loiajne5p22e", "content": "", "creation_timestamp": "2025-05-06T06:21:09.042913Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b63dbf22-a779-40a2-a76d-4f29588a5d16/export"/>
    <published>2025-05-06T06:21:09.042913+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0f7923cb-855b-45bb-908e-8fc859e37fc5/export</id>
    <title>0f7923cb-855b-45bb-908e-8fc859e37fc5</title>
    <updated>2026-05-09T12:03:53.219945+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0f7923cb-855b-45bb-908e-8fc859e37fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43069", "type": "seen", "source": "https://t.me/cvedetector/24557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-43069 - Apache HTTP Server Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2021-43069 \nPublished : May 6, 2025, 4:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T08:37:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0f7923cb-855b-45bb-908e-8fc859e37fc5/export"/>
    <published>2025-05-06T08:37:29+00:00</published>
  </entry>
</feed>
