<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:39:49.000753+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9b337158-e1ac-4e76-838d-1094d23f4555/export</id>
    <title>9b337158-e1ac-4e76-838d-1094d23f4555</title>
    <updated>2026-05-06T19:39:49.400134+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9b337158-e1ac-4e76-838d-1094d23f4555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40732", "type": "seen", "source": "https://t.me/cibsecurity/30517", "content": "\u203c CVE-2021-40732 \u203c\n\nXMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-13T20:26:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9b337158-e1ac-4e76-838d-1094d23f4555/export"/>
    <published>2021-10-13T20:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/519b105b-151e-4ee9-b252-c8a66730bcdc/export</id>
    <title>519b105b-151e-4ee9-b252-c8a66730bcdc</title>
    <updated>2026-05-06T19:39:49.400036+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "519b105b-151e-4ee9-b252-c8a66730bcdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40731", "type": "seen", "source": "https://t.me/cibsecurity/30634", "content": "\u203c CVE-2021-40731 \u203c\n\nAdobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by an out-of-bounds write vulnerability when parsing a crafted JPEG2000 file, which could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T18:28:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/519b105b-151e-4ee9-b252-c8a66730bcdc/export"/>
    <published>2021-10-15T18:28:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6cccb0e4-7b9e-4110-b8fa-a6cbb378fcbe/export</id>
    <title>6cccb0e4-7b9e-4110-b8fa-a6cbb378fcbe</title>
    <updated>2026-05-06T19:39:49.399945+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6cccb0e4-7b9e-4110-b8fa-a6cbb378fcbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40730", "type": "seen", "source": "https://t.me/cibsecurity/30636", "content": "\u203c CVE-2021-40730 \u203c\n\nAdobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a use-after-free that allow a remote attacker to disclose sensitive information on affected installations of of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG2000 images.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T18:28:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6cccb0e4-7b9e-4110-b8fa-a6cbb378fcbe/export"/>
    <published>2021-10-15T18:28:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b5712727-f2d6-462c-affe-22c96c6cc244/export</id>
    <title>b5712727-f2d6-462c-affe-22c96c6cc244</title>
    <updated>2026-05-06T19:39:49.399838+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b5712727-f2d6-462c-affe-22c96c6cc244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40733", "type": "seen", "source": "https://t.me/cibsecurity/32644", "content": "\u203c CVE-2021-40733 \u203c\n\nAdobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-18T20:16:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b5712727-f2d6-462c-affe-22c96c6cc244/export"/>
    <published>2021-11-18T20:16:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/76f57d27-08ad-4682-a45d-cd2a3e6d826e/export</id>
    <title>76f57d27-08ad-4682-a45d-cd2a3e6d826e</title>
    <updated>2026-05-06T19:39:49.399745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "76f57d27-08ad-4682-a45d-cd2a3e6d826e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40738", "type": "seen", "source": "https://t.me/cibsecurity/39084", "content": "\u203c CVE-2021-40738 \u203c\n\nAdobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T17:33:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/76f57d27-08ad-4682-a45d-cd2a3e6d826e/export"/>
    <published>2022-03-16T17:33:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5ac0e275-1dce-4864-961a-f5b2e17fcc46/export</id>
    <title>5ac0e275-1dce-4864-961a-f5b2e17fcc46</title>
    <updated>2026-05-06T19:39:49.399647+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5ac0e275-1dce-4864-961a-f5b2e17fcc46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40739", "type": "seen", "source": "https://t.me/cibsecurity/39092", "content": "\u203c CVE-2021-40739 \u203c\n\nAdobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-16T17:36:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5ac0e275-1dce-4864-961a-f5b2e17fcc46/export"/>
    <published>2022-03-16T17:36:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/26457a30-76f5-49f2-93d6-12eec1556ef4/export</id>
    <title>26457a30-76f5-49f2-93d6-12eec1556ef4</title>
    <updated>2026-05-06T19:39:49.399555+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "26457a30-76f5-49f2-93d6-12eec1556ef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4073", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m4jermavo52a", "content": "", "creation_timestamp": "2025-10-31T21:02:41.546026Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/26457a30-76f5-49f2-93d6-12eec1556ef4/export"/>
    <published>2025-10-31T21:02:41.546026+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2647a546-a8f2-48fd-8a8a-91e141ad1f2d/export</id>
    <title>2647a546-a8f2-48fd-8a8a-91e141ad1f2d</title>
    <updated>2026-05-06T19:39:49.399423+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2647a546-a8f2-48fd-8a8a-91e141ad1f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4073", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-4073.yaml", "content": "", "creation_timestamp": "2025-12-01T16:22:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2647a546-a8f2-48fd-8a8a-91e141ad1f2d/export"/>
    <published>2025-12-01T16:22:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39cac25a-d8d6-4469-9e4d-1daba06b028d/export</id>
    <title>39cac25a-d8d6-4469-9e4d-1daba06b028d</title>
    <updated>2026-05-06T19:39:49.397837+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39cac25a-d8d6-4469-9e4d-1daba06b028d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4073", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m74e5qd2ye26", "content": "", "creation_timestamp": "2025-12-03T21:02:26.473038Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39cac25a-d8d6-4469-9e4d-1daba06b028d/export"/>
    <published>2025-12-03T21:02:26.473038+00:00</published>
  </entry>
</feed>
