<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:41:06.584056+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3ac798bd-8ffd-470c-9cab-db40983e68ed/export</id>
    <title>3ac798bd-8ffd-470c-9cab-db40983e68ed</title>
    <updated>2026-05-04T13:41:07.162125+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3ac798bd-8ffd-470c-9cab-db40983e68ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42990", "type": "seen", "source": "https://t.me/cibsecurity/33500", "content": "\u203c CVE-2021-42990 \u203c\n\nFlexiHub For Windows is affected by Buffer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3ac798bd-8ffd-470c-9cab-db40983e68ed/export"/>
    <published>2021-12-07T22:22:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7a944d07-c81f-40b1-8623-c6e2ec6594f0/export</id>
    <title>7a944d07-c81f-40b1-8623-c6e2ec6594f0</title>
    <updated>2026-05-04T13:41:07.162017+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7a944d07-c81f-40b1-8623-c6e2ec6594f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42994", "type": "seen", "source": "https://t.me/cibsecurity/33505", "content": "\u203c CVE-2021-42994 \u203c\n\nDonglify is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Donglify above 1.0.12309 below 1.7.14110 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7a944d07-c81f-40b1-8623-c6e2ec6594f0/export"/>
    <published>2021-12-07T22:22:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a9ebe31-c178-45a7-89a5-b1bcb9dfb66f/export</id>
    <title>4a9ebe31-c178-45a7-89a5-b1bcb9dfb66f</title>
    <updated>2026-05-04T13:41:07.160065+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a9ebe31-c178-45a7-89a5-b1bcb9dfb66f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42993", "type": "seen", "source": "https://t.me/cibsecurity/33510", "content": "\u203c CVE-2021-42993 \u203c\n\nFlexiHub For Windows is affected by Integer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a9ebe31-c178-45a7-89a5-b1bcb9dfb66f/export"/>
    <published>2021-12-07T22:22:25+00:00</published>
  </entry>
</feed>
