<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T11:55:13.009713+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e03337d7-ab0b-4c30-99c8-9ba5b6e0a324/export</id>
    <title>e03337d7-ab0b-4c30-99c8-9ba5b6e0a324</title>
    <updated>2026-04-30T11:55:13.374627+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e03337d7-ab0b-4c30-99c8-9ba5b6e0a324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3134", "type": "seen", "source": "https://t.me/cibsecurity/21993", "content": "\u203c CVE-2021-3134 \u203c\n\nMubu 2.2.1 allows local users to gain privileges to execute commands, aka CNVD-2020-68878.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-12T22:54:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e03337d7-ab0b-4c30-99c8-9ba5b6e0a324/export"/>
    <published>2021-01-12T22:54:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/80fc2800-fedf-4e69-adbe-e5ebe7e6bace/export</id>
    <title>80fc2800-fedf-4e69-adbe-e5ebe7e6bace</title>
    <updated>2026-04-30T11:55:13.374539+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "80fc2800-fedf-4e69-adbe-e5ebe7e6bace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31349", "type": "seen", "source": "https://t.me/cibsecurity/30824", "content": "\u203c CVE-2021-31349 \u203c\n\nThe usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Technology Session Smart Router versions prior to 4.5.11, and all versions of 5.0 up to and including 5.0.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-19T22:33:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/80fc2800-fedf-4e69-adbe-e5ebe7e6bace/export"/>
    <published>2021-10-19T22:33:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b5a558b9-dd33-445a-8563-035756445688/export</id>
    <title>b5a558b9-dd33-445a-8563-035756445688</title>
    <updated>2026-04-30T11:55:13.374447+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b5a558b9-dd33-445a-8563-035756445688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31344", "type": "seen", "source": "https://t.me/cibsecurity/32039", "content": "\u203c CVE-2021-31344 \u203c\n\nA vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions &amp;lt; V2017.02.4), Nucleus ReadyStart V4 (All versions &amp;lt; V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-09T14:30:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b5a558b9-dd33-445a-8563-035756445688/export"/>
    <published>2021-11-09T14:30:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5d9d2076-9bad-4cd8-ae3e-846a8ce87b31/export</id>
    <title>5d9d2076-9bad-4cd8-ae3e-846a8ce87b31</title>
    <updated>2026-04-30T11:55:13.374313+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5d9d2076-9bad-4cd8-ae3e-846a8ce87b31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31345", "type": "seen", "source": "https://t.me/cibsecurity/32047", "content": "\u203c CVE-2021-31345 \u203c\n\nA vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions &amp;lt; V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-09T14:30:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5d9d2076-9bad-4cd8-ae3e-846a8ce87b31/export"/>
    <published>2021-11-09T14:30:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/97618999-cb49-4399-a9c8-1a2ea1899b08/export</id>
    <title>97618999-cb49-4399-a9c8-1a2ea1899b08</title>
    <updated>2026-04-30T11:55:13.371411+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "97618999-cb49-4399-a9c8-1a2ea1899b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31346", "type": "seen", "source": "https://t.me/cibsecurity/32048", "content": "\u203c CVE-2021-31346 \u203c\n\nA vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions &amp;lt; V2017.02.4), Nucleus ReadyStart V4 (All versions &amp;lt; V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-09T14:30:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/97618999-cb49-4399-a9c8-1a2ea1899b08/export"/>
    <published>2021-11-09T14:30:39+00:00</published>
  </entry>
</feed>
