<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:31:49.128852+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c398976-de9a-4cc2-b100-3017f78f0db2/export</id>
    <title>5c398976-de9a-4cc2-b100-3017f78f0db2</title>
    <updated>2026-05-06T11:31:49.470676+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c398976-de9a-4cc2-b100-3017f78f0db2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39474", "type": "seen", "source": "https://t.me/cibsecurity/32145", "content": "\u203c CVE-2021-39474 \u203c\n\nVulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-10T14:36:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c398976-de9a-4cc2-b100-3017f78f0db2/export"/>
    <published>2021-11-10T14:36:18+00:00</published>
  </entry>
</feed>
