<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T18:29:07.400865+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ba216bc-c22b-42df-81aa-bffbbd75229c/export</id>
    <title>4ba216bc-c22b-42df-81aa-bffbbd75229c</title>
    <updated>2026-05-04T18:29:07.741415+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ba216bc-c22b-42df-81aa-bffbbd75229c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31505", "type": "seen", "source": "https://t.me/cibsecurity/25785", "content": "\u203c CVE-2021-31505 \u203c\n\nThis vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus 1.9.0.3_278. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-12890.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-29T18:28:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ba216bc-c22b-42df-81aa-bffbbd75229c/export"/>
    <published>2021-06-29T18:28:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/715e80ba-29f9-44dd-a763-fb8e980dbeb0/export</id>
    <title>715e80ba-29f9-44dd-a763-fb8e980dbeb0</title>
    <updated>2026-05-04T18:29:07.741227+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "715e80ba-29f9-44dd-a763-fb8e980dbeb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31503", "type": "seen", "source": "https://t.me/cibsecurity/26760", "content": "\u203c CVE-2021-31503 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop Build 16.6.3.84 (package 16.6.3.134). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IGS files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12690.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-03T20:28:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/715e80ba-29f9-44dd-a763-fb8e980dbeb0/export"/>
    <published>2021-08-03T20:28:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fdc94001-e9df-466c-8816-c73875a9afa1/export</id>
    <title>fdc94001-e9df-466c-8816-c73875a9afa1</title>
    <updated>2026-05-04T18:29:07.738469+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fdc94001-e9df-466c-8816-c73875a9afa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31504", "type": "seen", "source": "https://t.me/cibsecurity/26762", "content": "\u203c CVE-2021-31504 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop Build 16.6.3.84 (package 16.6.3.134). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12691.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-03T20:28:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fdc94001-e9df-466c-8816-c73875a9afa1/export"/>
    <published>2021-08-03T20:28:56+00:00</published>
  </entry>
</feed>
