<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:22:17.500591+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/51510ff2-8cb2-4e5f-a0f2-77dcdf8e9ccc/export</id>
    <title>51510ff2-8cb2-4e5f-a0f2-77dcdf8e9ccc</title>
    <updated>2026-05-06T17:22:17.873303+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "51510ff2-8cb2-4e5f-a0f2-77dcdf8e9ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40709", "type": "seen", "source": "https://t.me/cibsecurity/29493", "content": "\u203c CVE-2021-40709 \u203c\n\nAdobe Photoshop versions 21.2.11 (and earlier) and 22.5 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted SVG file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-27T20:34:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/51510ff2-8cb2-4e5f-a0f2-77dcdf8e9ccc/export"/>
    <published>2021-09-27T20:34:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4c2cd3f6-473a-42e3-91c5-d114e73caa80/export</id>
    <title>4c2cd3f6-473a-42e3-91c5-d114e73caa80</title>
    <updated>2026-05-06T17:22:17.873191+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4c2cd3f6-473a-42e3-91c5-d114e73caa80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40700", "type": "seen", "source": "https://t.me/cibsecurity/29494", "content": "\u203c CVE-2021-40700 \u203c\n\nAdobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-27T20:34:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4c2cd3f6-473a-42e3-91c5-d114e73caa80/export"/>
    <published>2021-09-27T20:34:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a74a7f5-0d3b-44d0-abd1-c050d796a89a/export</id>
    <title>0a74a7f5-0d3b-44d0-abd1-c050d796a89a</title>
    <updated>2026-05-06T17:22:17.873081+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a74a7f5-0d3b-44d0-abd1-c050d796a89a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40702", "type": "seen", "source": "https://t.me/cibsecurity/29504", "content": "\u203c CVE-2021-40702 \u203c\n\nAdobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-27T20:35:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a74a7f5-0d3b-44d0-abd1-c050d796a89a/export"/>
    <published>2021-09-27T20:35:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d8126187-09d8-497d-96a2-732057ebefb5/export</id>
    <title>d8126187-09d8-497d-96a2-732057ebefb5</title>
    <updated>2026-05-06T17:22:17.872968+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d8126187-09d8-497d-96a2-732057ebefb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40701", "type": "seen", "source": "https://t.me/cibsecurity/29509", "content": "\u203c CVE-2021-40701 \u203c\n\nAdobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-27T20:35:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d8126187-09d8-497d-96a2-732057ebefb5/export"/>
    <published>2021-09-27T20:35:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4b9cf473-71a2-4785-ae47-823d8f4eb84f/export</id>
    <title>4b9cf473-71a2-4785-ae47-823d8f4eb84f</title>
    <updated>2026-05-06T17:22:17.872819+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4b9cf473-71a2-4785-ae47-823d8f4eb84f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40708", "type": "seen", "source": "https://t.me/cibsecurity/29655", "content": "\u203c CVE-2021-40708 \u203c\n\nAdobe Genuine Service versions 7.3 (and earlier) are affected by a privilege escalation vulnerability in the AGSService installer. An authenticated attacker could leverage this vulnerability to achieve read / write privileges to execute arbitrary code. User interaction is required to abuse this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T20:37:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4b9cf473-71a2-4785-ae47-823d8f4eb84f/export"/>
    <published>2021-09-29T20:37:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9faf58e6-a39e-42cc-806d-eeaff6d42e01/export</id>
    <title>9faf58e6-a39e-42cc-806d-eeaff6d42e01</title>
    <updated>2026-05-06T17:22:17.870544+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9faf58e6-a39e-42cc-806d-eeaff6d42e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4070", "type": "seen", "source": "https://t.me/cibsecurity/37964", "content": "\u203c CVE-2021-4070 \u203c\n\nOff-by-one Error in GitHub repository v2fly/v2ray-core prior to 4.44.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-23T22:13:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9faf58e6-a39e-42cc-806d-eeaff6d42e01/export"/>
    <published>2022-02-23T22:13:45+00:00</published>
  </entry>
</feed>
