<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 19:06:30 +0000</lastBuildDate>
    <item>
      <title>6bcb9e1b-64d4-46c1-a346-b9b73100584d</title>
      <link>https://db.gcve.eu/sighting/6bcb9e1b-64d4-46c1-a346-b9b73100584d/export</link>
      <description>{"uuid": "6bcb9e1b-64d4-46c1-a346-b9b73100584d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20986", "type": "seen", "source": "https://t.me/cibsecurity/23660", "content": "\u203c CVE-2021-20986 \u203c\n\nA Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T20:47:55.000000Z"}</description>
      <content:encoded>{"uuid": "6bcb9e1b-64d4-46c1-a346-b9b73100584d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20986", "type": "seen", "source": "https://t.me/cibsecurity/23660", "content": "\u203c CVE-2021-20986 \u203c\n\nA Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T20:47:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6bcb9e1b-64d4-46c1-a346-b9b73100584d/export</guid>
      <pubDate>Tue, 16 Feb 2021 20:47:55 +0000</pubDate>
    </item>
    <item>
      <title>970ac667-bbb9-4702-b5cf-62bee278e06d</title>
      <link>https://db.gcve.eu/sighting/970ac667-bbb9-4702-b5cf-62bee278e06d/export</link>
      <description>{"uuid": "970ac667-bbb9-4702-b5cf-62bee278e06d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20987", "type": "seen", "source": "https://t.me/cibsecurity/23666", "content": "\u203c CVE-2021-20987 \u203c\n\nA denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T20:48:00.000000Z"}</description>
      <content:encoded>{"uuid": "970ac667-bbb9-4702-b5cf-62bee278e06d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20987", "type": "seen", "source": "https://t.me/cibsecurity/23666", "content": "\u203c CVE-2021-20987 \u203c\n\nA denial of service and memory corruption vulnerability was found in Hilscher EtherNet/IP Core V2 prior to V2.13.0.21that may lead to code injection through network or make devices crash without recovery.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T20:48:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/970ac667-bbb9-4702-b5cf-62bee278e06d/export</guid>
      <pubDate>Tue, 16 Feb 2021 20:48:00 +0000</pubDate>
    </item>
    <item>
      <title>3ba02c48-76d0-47fb-9b5f-278e294fd928</title>
      <link>https://db.gcve.eu/sighting/3ba02c48-76d0-47fb-9b5f-278e294fd928/export</link>
      <description>{"uuid": "3ba02c48-76d0-47fb-9b5f-278e294fd928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20989", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3192", "content": "#exploit\n#IoT_Security\nCVE-2021-20989, CVE-2021-20990,\nCVE-2021-20991, CVE-2021-20992:\nMultiple vulnerabilities in Fibaro Home Center (PoC)\nhttps://seclists.org/fulldisclosure/2021/Apr/27", "creation_timestamp": "2021-04-23T11:02:04.000000Z"}</description>
      <content:encoded>{"uuid": "3ba02c48-76d0-47fb-9b5f-278e294fd928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20989", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3192", "content": "#exploit\n#IoT_Security\nCVE-2021-20989, CVE-2021-20990,\nCVE-2021-20991, CVE-2021-20992:\nMultiple vulnerabilities in Fibaro Home Center (PoC)\nhttps://seclists.org/fulldisclosure/2021/Apr/27", "creation_timestamp": "2021-04-23T11:02:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3ba02c48-76d0-47fb-9b5f-278e294fd928/export</guid>
      <pubDate>Fri, 23 Apr 2021 11:02:04 +0000</pubDate>
    </item>
  </channel>
</rss>
