<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T11:39:46.024534+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be1112ab-aa9d-4c10-9007-1a93c7bac5c2/export</id>
    <title>be1112ab-aa9d-4c10-9007-1a93c7bac5c2</title>
    <updated>2026-05-10T11:39:46.458075+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "be1112ab-aa9d-4c10-9007-1a93c7bac5c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43549", "type": "seen", "source": "https://t.me/cibsecurity/32612", "content": "\u203c CVE-2021-43549 \u203c\n\nA remote authenticated attacker with write access to a PI Server could trick a user into interacting with a PI Web API endpoint and redirect them to a malicious website. As a result, a victim may disclose sensitive information to the attacker or be provided with false information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-18T18:15:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be1112ab-aa9d-4c10-9007-1a93c7bac5c2/export"/>
    <published>2021-11-18T18:15:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d6ae2b8-8147-4b62-99c4-f01b9891f735/export</id>
    <title>7d6ae2b8-8147-4b62-99c4-f01b9891f735</title>
    <updated>2026-05-10T11:39:46.457992+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d6ae2b8-8147-4b62-99c4-f01b9891f735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43545", "type": "seen", "source": "https://t.me/cibsecurity/33652", "content": "\u203c CVE-2021-43545 \u203c\n\nUsing the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird &amp;lt; 91.4.0, Firefox ESR &amp;lt; 91.4.0, and Firefox &amp;lt; 95.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-09T00:24:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d6ae2b8-8147-4b62-99c4-f01b9891f735/export"/>
    <published>2021-12-09T00:24:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e9292020-358d-48d1-b745-3c3cedfc3db9/export</id>
    <title>e9292020-358d-48d1-b745-3c3cedfc3db9</title>
    <updated>2026-05-10T11:39:46.457899+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e9292020-358d-48d1-b745-3c3cedfc3db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43542", "type": "seen", "source": "https://t.me/cibsecurity/33658", "content": "\u203c CVE-2021-43542 \u203c\n\nUsing XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird &amp;lt; 91.4.0, Firefox ESR &amp;lt; 91.4.0, and Firefox &amp;lt; 95.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-09T00:24:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e9292020-358d-48d1-b745-3c3cedfc3db9/export"/>
    <published>2021-12-09T00:24:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/75b9a9cd-2f08-4e95-bb06-8b113542ecc4/export</id>
    <title>75b9a9cd-2f08-4e95-bb06-8b113542ecc4</title>
    <updated>2026-05-10T11:39:46.457805+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "75b9a9cd-2f08-4e95-bb06-8b113542ecc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43544", "type": "seen", "source": "https://t.me/cibsecurity/33662", "content": "\u203c CVE-2021-43544 \u203c\n\nWhen receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox &amp;lt; 95.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-09T00:24:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/75b9a9cd-2f08-4e95-bb06-8b113542ecc4/export"/>
    <published>2021-12-09T00:24:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/db66b5cb-127a-42ca-b393-9fe2b395f461/export</id>
    <title>db66b5cb-127a-42ca-b393-9fe2b395f461</title>
    <updated>2026-05-10T11:39:46.457682+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "db66b5cb-127a-42ca-b393-9fe2b395f461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43546", "type": "seen", "source": "https://t.me/cibsecurity/33665", "content": "\u203c CVE-2021-43546 \u203c\n\nIt was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird &amp;lt; 91.4.0, Firefox ESR &amp;lt; 91.4.0, and Firefox &amp;lt; 95.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-09T00:24:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/db66b5cb-127a-42ca-b393-9fe2b395f461/export"/>
    <published>2021-12-09T00:24:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f5930e16-4c38-4c6d-98f3-0d34faa1e330/export</id>
    <title>f5930e16-4c38-4c6d-98f3-0d34faa1e330</title>
    <updated>2026-05-10T11:39:46.457541+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f5930e16-4c38-4c6d-98f3-0d34faa1e330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43548", "type": "seen", "source": "https://t.me/cibsecurity/34689", "content": "\u203c CVE-2021-43548 \u203c\n\nPatient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-27T22:23:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f5930e16-4c38-4c6d-98f3-0d34faa1e330/export"/>
    <published>2021-12-27T22:23:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/19ba7e68-9e26-42d4-b0d0-5fe6dd2e9526/export</id>
    <title>19ba7e68-9e26-42d4-b0d0-5fe6dd2e9526</title>
    <updated>2026-05-10T11:39:46.455867+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "19ba7e68-9e26-42d4-b0d0-5fe6dd2e9526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43547", "type": "seen", "source": "https://t.me/cibsecurity/42002", "content": "\u203c CVE-2021-43547 \u203c\n\nTwinOaks Computing CoreDX DDS versions prior to 5.9.1 are susceptible to exploitation when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T20:36:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/19ba7e68-9e26-42d4-b0d0-5fe6dd2e9526/export"/>
    <published>2022-05-05T20:36:35+00:00</published>
  </entry>
</feed>
