<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 04:01:32 +0000</lastBuildDate>
    <item>
      <title>5b178c2a-403a-4ab2-8dda-5c02fe06a1bd</title>
      <link>https://vulnerability.circl.lu/sighting/5b178c2a-403a-4ab2-8dda-5c02fe06a1bd/export</link>
      <description>{"uuid": "5b178c2a-403a-4ab2-8dda-5c02fe06a1bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36722", "type": "seen", "source": "https://t.me/cibsecurity/34741", "content": "\u203c CVE-2021-36722 \u203c\n\nEmuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-29T18:32:31.000000Z"}</description>
      <content:encoded>{"uuid": "5b178c2a-403a-4ab2-8dda-5c02fe06a1bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36722", "type": "seen", "source": "https://t.me/cibsecurity/34741", "content": "\u203c CVE-2021-36722 \u203c\n\nEmuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-29T18:32:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5b178c2a-403a-4ab2-8dda-5c02fe06a1bd/export</guid>
      <pubDate>Wed, 29 Dec 2021 18:32:31 +0000</pubDate>
    </item>
  </channel>
</rss>
