<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 16:38:57 +0000</lastBuildDate>
    <item>
      <title>02582e7b-e6c4-4c3e-b72b-ff5de9a46877</title>
      <link>https://vulnerability.circl.lu/sighting/02582e7b-e6c4-4c3e-b72b-ff5de9a46877/export</link>
      <description>{"uuid": "02582e7b-e6c4-4c3e-b72b-ff5de9a46877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "seen", "source": "https://t.me/cibsecurity/33393", "content": "\u203c CVE-2021-43936 \u203c\n\nThe software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-06T20:20:50.000000Z"}</description>
      <content:encoded>{"uuid": "02582e7b-e6c4-4c3e-b72b-ff5de9a46877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "seen", "source": "https://t.me/cibsecurity/33393", "content": "\u203c CVE-2021-43936 \u203c\n\nThe software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-06T20:20:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/02582e7b-e6c4-4c3e-b72b-ff5de9a46877/export</guid>
      <pubDate>Mon, 06 Dec 2021 20:20:50 +0000</pubDate>
    </item>
    <item>
      <title>aadf0572-c101-4af6-875e-c1cd70fff4eb</title>
      <link>https://vulnerability.circl.lu/sighting/aadf0572-c101-4af6-875e-c1cd70fff4eb/export</link>
      <description>{"uuid": "aadf0572-c101-4af6-875e-c1cd70fff4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1425", "content": "#exploit\n#CVE-2021-43936:\nRCE in WebHMI Firmware\n\nhttps://github.com/LongWayHomie/CVE-2021-43936\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T10:00:39.000000Z"}</description>
      <content:encoded>{"uuid": "aadf0572-c101-4af6-875e-c1cd70fff4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1425", "content": "#exploit\n#CVE-2021-43936:\nRCE in WebHMI Firmware\n\nhttps://github.com/LongWayHomie/CVE-2021-43936\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T10:00:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aadf0572-c101-4af6-875e-c1cd70fff4eb/export</guid>
      <pubDate>Tue, 14 Dec 2021 10:00:39 +0000</pubDate>
    </item>
    <item>
      <title>641fc10f-ee0d-46b3-a357-b4143f78527f</title>
      <link>https://vulnerability.circl.lu/sighting/641fc10f-ee0d-46b3-a357-b4143f78527f/export</link>
      <description>{"uuid": "641fc10f-ee0d-46b3-a357-b4143f78527f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4968", "content": "#exploit\nCVE-2021-43936:\nRCE in WebHMI Firmware\nhttps://github.com/LongWayHomie/CVE-2021-43936", "creation_timestamp": "2021-12-14T11:03:01.000000Z"}</description>
      <content:encoded>{"uuid": "641fc10f-ee0d-46b3-a357-b4143f78527f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4968", "content": "#exploit\nCVE-2021-43936:\nRCE in WebHMI Firmware\nhttps://github.com/LongWayHomie/CVE-2021-43936", "creation_timestamp": "2021-12-14T11:03:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/641fc10f-ee0d-46b3-a357-b4143f78527f/export</guid>
      <pubDate>Tue, 14 Dec 2021 11:03:01 +0000</pubDate>
    </item>
    <item>
      <title>adf8e15d-27b2-4c0d-b107-b54db812eaeb</title>
      <link>https://vulnerability.circl.lu/sighting/adf8e15d-27b2-4c0d-b107-b54db812eaeb/export</link>
      <description>{"uuid": "adf8e15d-27b2-4c0d-b107-b54db812eaeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "seen", "source": "https://t.me/arpsyndicate/1858", "content": "#ExploitObserverAlert\n\nCVE-2021-43936\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2021-43936. The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.\n\nFIRST-EPSS: 0.016150000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-17T22:44:53.000000Z"}</description>
      <content:encoded>{"uuid": "adf8e15d-27b2-4c0d-b107-b54db812eaeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43936", "type": "seen", "source": "https://t.me/arpsyndicate/1858", "content": "#ExploitObserverAlert\n\nCVE-2021-43936\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2021-43936. The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.\n\nFIRST-EPSS: 0.016150000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-17T22:44:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/adf8e15d-27b2-4c0d-b107-b54db812eaeb/export</guid>
      <pubDate>Sun, 17 Dec 2023 22:44:53 +0000</pubDate>
    </item>
  </channel>
</rss>
