<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 15:46:42 +0000</lastBuildDate>
    <item>
      <title>5ee19e05-5492-4cd4-8102-6981d49ddfb1</title>
      <link>https://vulnerability.circl.lu/sighting/5ee19e05-5492-4cd4-8102-6981d49ddfb1/export</link>
      <description>{"uuid": "5ee19e05-5492-4cd4-8102-6981d49ddfb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37270", "type": "seen", "source": "https://t.me/cibsecurity/29525", "content": "\u203c CVE-2021-37270 \u203c\n\nThere is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-28T00:34:58.000000Z"}</description>
      <content:encoded>{"uuid": "5ee19e05-5492-4cd4-8102-6981d49ddfb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37270", "type": "seen", "source": "https://t.me/cibsecurity/29525", "content": "\u203c CVE-2021-37270 \u203c\n\nThere is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-28T00:34:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5ee19e05-5492-4cd4-8102-6981d49ddfb1/export</guid>
      <pubDate>Tue, 28 Sep 2021 00:34:58 +0000</pubDate>
    </item>
  </channel>
</rss>
