<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 11:09:56 +0000</lastBuildDate>
    <item>
      <title>1fb4af45-fa8c-4148-ae6f-ee48bcf94f78</title>
      <link>https://vulnerability.circl.lu/sighting/1fb4af45-fa8c-4148-ae6f-ee48bcf94f78/export</link>
      <description>{"uuid": "1fb4af45-fa8c-4148-ae6f-ee48bcf94f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43667", "type": "seen", "source": "https://t.me/cibsecurity/32610", "content": "\u203c CVE-2021-43667 \u203c\n\nA vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-18T18:15:42.000000Z"}</description>
      <content:encoded>{"uuid": "1fb4af45-fa8c-4148-ae6f-ee48bcf94f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43667", "type": "seen", "source": "https://t.me/cibsecurity/32610", "content": "\u203c CVE-2021-43667 \u203c\n\nA vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-18T18:15:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1fb4af45-fa8c-4148-ae6f-ee48bcf94f78/export</guid>
      <pubDate>Thu, 18 Nov 2021 18:15:42 +0000</pubDate>
    </item>
    <item>
      <title>a06e2334-d1e4-431c-b9c6-58d00bb0314f</title>
      <link>https://vulnerability.circl.lu/sighting/a06e2334-d1e4-431c-b9c6-58d00bb0314f/export</link>
      <description>{"uuid": "a06e2334-d1e4-431c-b9c6-58d00bb0314f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43666", "type": "seen", "source": "https://t.me/cibsecurity/39507", "content": "\u203c CVE-2021-43666 \u203c\n\nA Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-24T21:29:48.000000Z"}</description>
      <content:encoded>{"uuid": "a06e2334-d1e4-431c-b9c6-58d00bb0314f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43666", "type": "seen", "source": "https://t.me/cibsecurity/39507", "content": "\u203c CVE-2021-43666 \u203c\n\nA Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-24T21:29:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a06e2334-d1e4-431c-b9c6-58d00bb0314f/export</guid>
      <pubDate>Thu, 24 Mar 2022 21:29:48 +0000</pubDate>
    </item>
    <item>
      <title>42c105ec-70ca-4b4f-bb25-4a310c48921e</title>
      <link>https://vulnerability.circl.lu/sighting/42c105ec-70ca-4b4f-bb25-4a310c48921e/export</link>
      <description>{"uuid": "42c105ec-70ca-4b4f-bb25-4a310c48921e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43664", "type": "seen", "source": "https://t.me/cibsecurity/39883", "content": "\u203c CVE-2021-43664 \u203c\n\ntotolink EX300_v2 V4.0.3c.140_B20210429 was discovered to contain a command injection vulnerability via the component process&amp;nbsp;forceugpo.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-31T02:17:55.000000Z"}</description>
      <content:encoded>{"uuid": "42c105ec-70ca-4b4f-bb25-4a310c48921e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43664", "type": "seen", "source": "https://t.me/cibsecurity/39883", "content": "\u203c CVE-2021-43664 \u203c\n\ntotolink EX300_v2 V4.0.3c.140_B20210429 was discovered to contain a command injection vulnerability via the component process&amp;nbsp;forceugpo.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-31T02:17:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/42c105ec-70ca-4b4f-bb25-4a310c48921e/export</guid>
      <pubDate>Thu, 31 Mar 2022 02:17:55 +0000</pubDate>
    </item>
  </channel>
</rss>
