<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T19:51:09.486928+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6bcb9e1b-64d4-46c1-a346-b9b73100584d/export</id>
    <title>6bcb9e1b-64d4-46c1-a346-b9b73100584d</title>
    <updated>2026-04-30T19:51:09.877717+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6bcb9e1b-64d4-46c1-a346-b9b73100584d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20986", "type": "seen", "source": "https://t.me/cibsecurity/23660", "content": "\u203c CVE-2021-20986 \u203c\n\nA Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T20:47:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6bcb9e1b-64d4-46c1-a346-b9b73100584d/export"/>
    <published>2021-02-16T20:47:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/970ac667-bbb9-4702-b5cf-62bee278e06d/export</id>
    <title>970ac667-bbb9-4702-b5cf-62bee278e06d</title>
    <updated>2026-04-30T19:51:09.877616+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "970ac667-bbb9-4702-b5cf-62bee278e06d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20987", "type": "seen", "source": "https://t.me/cibsecurity/23666", "content": "\u203c CVE-2021-20987 \u203c\n\nA denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T20:48:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/970ac667-bbb9-4702-b5cf-62bee278e06d/export"/>
    <published>2021-02-16T20:48:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3ba02c48-76d0-47fb-9b5f-278e294fd928/export</id>
    <title>3ba02c48-76d0-47fb-9b5f-278e294fd928</title>
    <updated>2026-04-30T19:51:09.872593+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3ba02c48-76d0-47fb-9b5f-278e294fd928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20989", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3192", "content": "#exploit\n#IoT_Security\nCVE-2021-20989, CVE-2021-20990,\nCVE-2021-20991, CVE-2021-20992:\nMultiple vulnerabilities in Fibaro Home Center (PoC)\nhttps://seclists.org/fulldisclosure/2021/Apr/27", "creation_timestamp": "2021-04-23T11:02:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3ba02c48-76d0-47fb-9b5f-278e294fd928/export"/>
    <published>2021-04-23T11:02:04+00:00</published>
  </entry>
</feed>
