<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 12:03:52 +0000</lastBuildDate>
    <item>
      <title>e06501fb-89f4-46f0-9067-a70a9dc3ed50</title>
      <link>https://vulnerability.circl.lu/sighting/e06501fb-89f4-46f0-9067-a70a9dc3ed50/export</link>
      <description>{"uuid": "e06501fb-89f4-46f0-9067-a70a9dc3ed50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43064", "type": "seen", "source": "https://t.me/cibsecurity/33576", "content": "\u203c CVE-2021-43064 \u203c\n\nA url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:38.000000Z"}</description>
      <content:encoded>{"uuid": "e06501fb-89f4-46f0-9067-a70a9dc3ed50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43064", "type": "seen", "source": "https://t.me/cibsecurity/33576", "content": "\u203c CVE-2021-43064 \u203c\n\nA url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e06501fb-89f4-46f0-9067-a70a9dc3ed50/export</guid>
      <pubDate>Wed, 08 Dec 2021 16:22:38 +0000</pubDate>
    </item>
    <item>
      <title>b60fda04-3a53-4b12-9f40-5c3088d49a66</title>
      <link>https://vulnerability.circl.lu/sighting/b60fda04-3a53-4b12-9f40-5c3088d49a66/export</link>
      <description>{"uuid": "b60fda04-3a53-4b12-9f40-5c3088d49a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43063", "type": "seen", "source": "https://t.me/cibsecurity/33577", "content": "\u203c CVE-2021-43063 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:39.000000Z"}</description>
      <content:encoded>{"uuid": "b60fda04-3a53-4b12-9f40-5c3088d49a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43063", "type": "seen", "source": "https://t.me/cibsecurity/33577", "content": "\u203c CVE-2021-43063 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b60fda04-3a53-4b12-9f40-5c3088d49a66/export</guid>
      <pubDate>Wed, 08 Dec 2021 16:22:39 +0000</pubDate>
    </item>
    <item>
      <title>c56b76a4-682d-44d2-9885-27a334cd266b</title>
      <link>https://vulnerability.circl.lu/sighting/c56b76a4-682d-44d2-9885-27a334cd266b/export</link>
      <description>{"uuid": "c56b76a4-682d-44d2-9885-27a334cd266b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43062", "type": "seen", "source": "https://t.me/cibsecurity/36693", "content": "\u203c CVE-2021-43062 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T14:28:19.000000Z"}</description>
      <content:encoded>{"uuid": "c56b76a4-682d-44d2-9885-27a334cd266b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43062", "type": "seen", "source": "https://t.me/cibsecurity/36693", "content": "\u203c CVE-2021-43062 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-02T14:28:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c56b76a4-682d-44d2-9885-27a334cd266b/export</guid>
      <pubDate>Wed, 02 Feb 2022 14:28:19 +0000</pubDate>
    </item>
    <item>
      <title>4fe656b2-46c9-468b-803a-0abf5d323fa2</title>
      <link>https://vulnerability.circl.lu/sighting/4fe656b2-46c9-468b-803a-0abf5d323fa2/export</link>
      <description>{"uuid": "4fe656b2-46c9-468b-803a-0abf5d323fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43066", "type": "seen", "source": "https://t.me/cibsecurity/42400", "content": "\u203c CVE-2021-43066 \u203c\n\nA external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T20:34:57.000000Z"}</description>
      <content:encoded>{"uuid": "4fe656b2-46c9-468b-803a-0abf5d323fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43066", "type": "seen", "source": "https://t.me/cibsecurity/42400", "content": "\u203c CVE-2021-43066 \u203c\n\nA external control of file name or path in Fortinet FortiClientWindows version 7.0.2 and below, version 6.4.6 and below, version 6.2.9 and below, version 6.0.10 and below allows attacker to escalate privilege via the MSI installer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T20:34:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4fe656b2-46c9-468b-803a-0abf5d323fa2/export</guid>
      <pubDate>Wed, 11 May 2022 20:34:57 +0000</pubDate>
    </item>
    <item>
      <title>b63dbf22-a779-40a2-a76d-4f29588a5d16</title>
      <link>https://vulnerability.circl.lu/sighting/b63dbf22-a779-40a2-a76d-4f29588a5d16/export</link>
      <description>{"uuid": "b63dbf22-a779-40a2-a76d-4f29588a5d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loiajne5p22e", "content": "", "creation_timestamp": "2025-05-06T06:21:09.042913Z"}</description>
      <content:encoded>{"uuid": "b63dbf22-a779-40a2-a76d-4f29588a5d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43069", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loiajne5p22e", "content": "", "creation_timestamp": "2025-05-06T06:21:09.042913Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b63dbf22-a779-40a2-a76d-4f29588a5d16/export</guid>
      <pubDate>Tue, 06 May 2025 06:21:09 +0000</pubDate>
    </item>
    <item>
      <title>0f7923cb-855b-45bb-908e-8fc859e37fc5</title>
      <link>https://vulnerability.circl.lu/sighting/0f7923cb-855b-45bb-908e-8fc859e37fc5/export</link>
      <description>{"uuid": "0f7923cb-855b-45bb-908e-8fc859e37fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43069", "type": "seen", "source": "https://t.me/cvedetector/24557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-43069 - Apache HTTP Server Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2021-43069 \nPublished : May 6, 2025, 4:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T08:37:29.000000Z"}</description>
      <content:encoded>{"uuid": "0f7923cb-855b-45bb-908e-8fc859e37fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43069", "type": "seen", "source": "https://t.me/cvedetector/24557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-43069 - Apache HTTP Server Remote Command Execution\", \n  \"Content\": \"CVE ID : CVE-2021-43069 \nPublished : May 6, 2025, 4:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T08:37:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0f7923cb-855b-45bb-908e-8fc859e37fc5/export</guid>
      <pubDate>Tue, 06 May 2025 08:37:29 +0000</pubDate>
    </item>
  </channel>
</rss>
