<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 15:47:24 +0000</lastBuildDate>
    <item>
      <title>e7299dc0-6a68-4173-b3d9-d8d8cf2daddf</title>
      <link>https://vulnerability.circl.lu/sighting/e7299dc0-6a68-4173-b3d9-d8d8cf2daddf/export</link>
      <description>{"uuid": "e7299dc0-6a68-4173-b3d9-d8d8cf2daddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41236", "type": "seen", "source": "https://t.me/cibsecurity/34951", "content": "\u203c CVE-2021-41236 \u203c\n\nOroPlatform is a PHP Business Application Platform. In affected versions the email template preview is vulnerable to XSS payload added to email template content. An attacker must have permission to create or edit an email template. For successful payload, execution the attacked user must preview a vulnerable email template. There are no workarounds that address this vulnerability. Users are advised to upgrade as soon as is possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-04T22:38:23.000000Z"}</description>
      <content:encoded>{"uuid": "e7299dc0-6a68-4173-b3d9-d8d8cf2daddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41236", "type": "seen", "source": "https://t.me/cibsecurity/34951", "content": "\u203c CVE-2021-41236 \u203c\n\nOroPlatform is a PHP Business Application Platform. In affected versions the email template preview is vulnerable to XSS payload added to email template content. An attacker must have permission to create or edit an email template. For successful payload, execution the attacked user must preview a vulnerable email template. There are no workarounds that address this vulnerability. Users are advised to upgrade as soon as is possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-04T22:38:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e7299dc0-6a68-4173-b3d9-d8d8cf2daddf/export</guid>
      <pubDate>Tue, 04 Jan 2022 22:38:23 +0000</pubDate>
    </item>
  </channel>
</rss>
