<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T21:01:44.016940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1fb4af45-fa8c-4148-ae6f-ee48bcf94f78/export</id>
    <title>1fb4af45-fa8c-4148-ae6f-ee48bcf94f78</title>
    <updated>2026-05-05T21:01:44.370465+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1fb4af45-fa8c-4148-ae6f-ee48bcf94f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43667", "type": "seen", "source": "https://t.me/cibsecurity/32610", "content": "\u203c CVE-2021-43667 \u203c\n\nA vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-18T18:15:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1fb4af45-fa8c-4148-ae6f-ee48bcf94f78/export"/>
    <published>2021-11-18T18:15:42+00:00</published>
  </entry>
</feed>
