<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:59:52.582667+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be70485b-414a-4217-8a96-a7226dd26ba3/export</id>
    <title>be70485b-414a-4217-8a96-a7226dd26ba3</title>
    <updated>2026-05-06T09:59:52.969952+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "be70485b-414a-4217-8a96-a7226dd26ba3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3458", "type": "seen", "source": "https://t.me/cibsecurity/27441", "content": "\u203c CVE-2021-3458 \u203c\n\nThe Motorola MM1000 device configuration portal can be accessed without authentication, which could allow adapter settings to be modified.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-17T20:16:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be70485b-414a-4217-8a96-a7226dd26ba3/export"/>
    <published>2021-08-17T20:16:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/057779ab-4ab2-4268-83d9-bcd2e2ddb4e7/export</id>
    <title>057779ab-4ab2-4268-83d9-bcd2e2ddb4e7</title>
    <updated>2026-05-06T09:59:52.969868+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "057779ab-4ab2-4268-83d9-bcd2e2ddb4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34581", "type": "seen", "source": "https://t.me/cibsecurity/28074", "content": "\u203c CVE-2021-34581 \u203c\n\nMissing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T14:33:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/057779ab-4ab2-4268-83d9-bcd2e2ddb4e7/export"/>
    <published>2021-08-31T14:33:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eba96675-e576-4b32-9690-5fa51c619c27/export</id>
    <title>eba96675-e576-4b32-9690-5fa51c619c27</title>
    <updated>2026-05-06T09:59:52.969784+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eba96675-e576-4b32-9690-5fa51c619c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34583", "type": "seen", "source": "https://t.me/cibsecurity/31195", "content": "\u203c CVE-2021-34583 \u203c\n\nCrafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-26T14:14:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eba96675-e576-4b32-9690-5fa51c619c27/export"/>
    <published>2021-10-26T14:14:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d8f7868f-70da-4368-8609-5d6530b7b080/export</id>
    <title>d8f7868f-70da-4368-8609-5d6530b7b080</title>
    <updated>2026-05-06T09:59:52.969689+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d8f7868f-70da-4368-8609-5d6530b7b080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34585", "type": "seen", "source": "https://t.me/cibsecurity/31196", "content": "\u203c CVE-2021-34585 \u203c\n\nIn the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-26T14:14:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d8f7868f-70da-4368-8609-5d6530b7b080/export"/>
    <published>2021-10-26T14:14:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d387b5fe-d3f8-4d74-bac8-0466675f1a43/export</id>
    <title>d387b5fe-d3f8-4d74-bac8-0466675f1a43</title>
    <updated>2026-05-06T09:59:52.969575+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d387b5fe-d3f8-4d74-bac8-0466675f1a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34584", "type": "seen", "source": "https://t.me/cibsecurity/31198", "content": "\u203c CVE-2021-34584 \u203c\n\nCrafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-26T14:14:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d387b5fe-d3f8-4d74-bac8-0466675f1a43/export"/>
    <published>2021-10-26T14:14:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a0a99d39-b593-4358-adba-d709d12f11b7/export</id>
    <title>a0a99d39-b593-4358-adba-d709d12f11b7</title>
    <updated>2026-05-06T09:59:52.969463+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a0a99d39-b593-4358-adba-d709d12f11b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34586", "type": "seen", "source": "https://t.me/cibsecurity/31204", "content": "\u203c CVE-2021-34586 \u203c\n\nIn the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-26T14:14:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a0a99d39-b593-4358-adba-d709d12f11b7/export"/>
    <published>2021-10-26T14:14:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a63da7a-124a-42ee-a562-cf680ff6dac6/export</id>
    <title>8a63da7a-124a-42ee-a562-cf680ff6dac6</title>
    <updated>2026-05-06T09:59:52.969379+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a63da7a-124a-42ee-a562-cf680ff6dac6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34582", "type": "seen", "source": "https://t.me/cibsecurity/32147", "content": "\u203c CVE-2021-34582 \u203c\n\nIn Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-10T14:36:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a63da7a-124a-42ee-a562-cf680ff6dac6/export"/>
    <published>2021-11-10T14:36:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1085a7ca-b7c2-4d9f-ae67-cefb97b2afd9/export</id>
    <title>1085a7ca-b7c2-4d9f-ae67-cefb97b2afd9</title>
    <updated>2026-05-06T09:59:52.969288+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1085a7ca-b7c2-4d9f-ae67-cefb97b2afd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34588", "type": "seen", "source": "https://t.me/cibsecurity/41517", "content": "\u203c CVE-2021-34588 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1085a7ca-b7c2-4d9f-ae67-cefb97b2afd9/export"/>
    <published>2022-04-27T20:13:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3da7ec05-57eb-47ba-b2d6-4a38fa529d83/export</id>
    <title>3da7ec05-57eb-47ba-b2d6-4a38fa529d83</title>
    <updated>2026-05-06T09:59:52.969164+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3da7ec05-57eb-47ba-b2d6-4a38fa529d83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34587", "type": "seen", "source": "https://t.me/cibsecurity/41519", "content": "\u203c CVE-2021-34587 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3da7ec05-57eb-47ba-b2d6-4a38fa529d83/export"/>
    <published>2022-04-27T20:13:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bfc19c47-9629-4222-b7aa-acbed0e9a916/export</id>
    <title>bfc19c47-9629-4222-b7aa-acbed0e9a916</title>
    <updated>2026-05-06T09:59:52.967072+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bfc19c47-9629-4222-b7aa-acbed0e9a916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34589", "type": "seen", "source": "https://t.me/cibsecurity/41520", "content": "\u203c CVE-2021-34589 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bfc19c47-9629-4222-b7aa-acbed0e9a916/export"/>
    <published>2022-04-27T20:13:29+00:00</published>
  </entry>
</feed>
