<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T16:35:49.255664+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f1e7e956-f28d-452c-8524-6022091da655/export</id>
    <title>f1e7e956-f28d-452c-8524-6022091da655</title>
    <updated>2026-05-04T16:35:49.676880+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f1e7e956-f28d-452c-8524-6022091da655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32987", "type": "seen", "source": "https://t.me/cibsecurity/29315", "content": "\u203c CVE-2021-32987 \u203c\n\nNull pointer dereference in SuiteLink server while processing command 0x0b\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-23T18:29:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f1e7e956-f28d-452c-8524-6022091da655/export"/>
    <published>2021-09-23T18:29:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/916964f6-30b7-44a2-a8cb-bc982086fb1e/export</id>
    <title>916964f6-30b7-44a2-a8cb-bc982086fb1e</title>
    <updated>2026-05-04T16:35:49.676768+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "916964f6-30b7-44a2-a8cb-bc982086fb1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32985", "type": "seen", "source": "https://t.me/cibsecurity/40129", "content": "\u203c CVE-2021-32985 \u203c\n\nAVEVA System Platform versions 2017 through 2020 R2 P01 does not properly verify that the source of data or communication is valid.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T00:28:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/916964f6-30b7-44a2-a8cb-bc982086fb1e/export"/>
    <published>2022-04-05T00:28:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5a46382-bcce-4cd2-a168-f8c32929f9e3/export</id>
    <title>e5a46382-bcce-4cd2-a168-f8c32929f9e3</title>
    <updated>2026-05-04T16:35:49.676649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5a46382-bcce-4cd2-a168-f8c32929f9e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32984", "type": "seen", "source": "https://t.me/cibsecurity/40131", "content": "\u203c CVE-2021-32984 \u203c\n\nAll programming connections receive the same unlocked privileges, which can result in a privilege escalation. During the time Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, an attacker can connect to the PLC and read the project without authorization.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T00:28:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5a46382-bcce-4cd2-a168-f8c32929f9e3/export"/>
    <published>2022-04-05T00:28:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6f262929-b7a6-48e7-a2aa-cdc6f8ceaf7d/export</id>
    <title>6f262929-b7a6-48e7-a2aa-cdc6f8ceaf7d</title>
    <updated>2026-05-04T16:35:49.676494+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6f262929-b7a6-48e7-a2aa-cdc6f8ceaf7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32986", "type": "seen", "source": "https://t.me/cibsecurity/40137", "content": "\u203c CVE-2021-32986 \u203c\n\nAfter Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T00:28:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6f262929-b7a6-48e7-a2aa-cdc6f8ceaf7d/export"/>
    <published>2022-04-05T00:28:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/da41f410-4920-42b3-a2fb-086356c21043/export</id>
    <title>da41f410-4920-42b3-a2fb-086356c21043</title>
    <updated>2026-05-04T16:35:49.673765+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "da41f410-4920-42b3-a2fb-086356c21043", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32989", "type": "seen", "source": "https://t.me/cibsecurity/43336", "content": "\u203c CVE-2021-32989 \u203c\n\nWhen a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-25T18:38:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/da41f410-4920-42b3-a2fb-086356c21043/export"/>
    <published>2022-05-25T18:38:14+00:00</published>
  </entry>
</feed>
