<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 09:12:24 +0000</lastBuildDate>
    <item>
      <title>3219d0e9-4fa2-4acc-b15a-16795340b2cb</title>
      <link>https://db.gcve.eu/sighting/3219d0e9-4fa2-4acc-b15a-16795340b2cb/export</link>
      <description>{"uuid": "3219d0e9-4fa2-4acc-b15a-16795340b2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34594", "type": "seen", "source": "https://t.me/cibsecurity/31802", "content": "\u203c CVE-2021-34594 \u203c\n\nTwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T13:24:40.000000Z"}</description>
      <content:encoded>{"uuid": "3219d0e9-4fa2-4acc-b15a-16795340b2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34594", "type": "seen", "source": "https://t.me/cibsecurity/31802", "content": "\u203c CVE-2021-34594 \u203c\n\nTwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T13:24:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3219d0e9-4fa2-4acc-b15a-16795340b2cb/export</guid>
      <pubDate>Thu, 04 Nov 2021 13:24:40 +0000</pubDate>
    </item>
    <item>
      <title>65445580-2658-4863-8ebc-e0d65819bdbd</title>
      <link>https://db.gcve.eu/sighting/65445580-2658-4863-8ebc-e0d65819bdbd/export</link>
      <description>{"uuid": "65445580-2658-4863-8ebc-e0d65819bdbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34597", "type": "seen", "source": "https://t.me/cibsecurity/31803", "content": "\u203c CVE-2021-34597 \u203c\n\nImproper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T13:24:41.000000Z"}</description>
      <content:encoded>{"uuid": "65445580-2658-4863-8ebc-e0d65819bdbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34597", "type": "seen", "source": "https://t.me/cibsecurity/31803", "content": "\u203c CVE-2021-34597 \u203c\n\nImproper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T13:24:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/65445580-2658-4863-8ebc-e0d65819bdbd/export</guid>
      <pubDate>Thu, 04 Nov 2021 13:24:41 +0000</pubDate>
    </item>
    <item>
      <title>0b91c852-af29-4300-85c6-6ed60bfb81d7</title>
      <link>https://db.gcve.eu/sighting/0b91c852-af29-4300-85c6-6ed60bfb81d7/export</link>
      <description>{"uuid": "0b91c852-af29-4300-85c6-6ed60bfb81d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34598", "type": "seen", "source": "https://t.me/cibsecurity/32144", "content": "\u203c CVE-2021-34598 \u203c\n\nIn Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-10T14:36:17.000000Z"}</description>
      <content:encoded>{"uuid": "0b91c852-af29-4300-85c6-6ed60bfb81d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34598", "type": "seen", "source": "https://t.me/cibsecurity/32144", "content": "\u203c CVE-2021-34598 \u203c\n\nIn Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-10T14:36:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0b91c852-af29-4300-85c6-6ed60bfb81d7/export</guid>
      <pubDate>Wed, 10 Nov 2021 14:36:17 +0000</pubDate>
    </item>
    <item>
      <title>09c36780-ace6-4c79-adce-3bb35cb816b2</title>
      <link>https://db.gcve.eu/sighting/09c36780-ace6-4c79-adce-3bb35cb816b2/export</link>
      <description>{"uuid": "09c36780-ace6-4c79-adce-3bb35cb816b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34599", "type": "seen", "source": "https://t.me/cibsecurity/33176", "content": "\u203c CVE-2021-34599 \u203c\n\nAffected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-01T12:35:12.000000Z"}</description>
      <content:encoded>{"uuid": "09c36780-ace6-4c79-adce-3bb35cb816b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34599", "type": "seen", "source": "https://t.me/cibsecurity/33176", "content": "\u203c CVE-2021-34599 \u203c\n\nAffected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-01T12:35:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/09c36780-ace6-4c79-adce-3bb35cb816b2/export</guid>
      <pubDate>Wed, 01 Dec 2021 12:35:12 +0000</pubDate>
    </item>
    <item>
      <title>46bd54eb-4754-460a-8d9a-c8661c1d388d</title>
      <link>https://db.gcve.eu/sighting/46bd54eb-4754-460a-8d9a-c8661c1d388d/export</link>
      <description>{"uuid": "46bd54eb-4754-460a-8d9a-c8661c1d388d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34590", "type": "seen", "source": "https://t.me/cibsecurity/41511", "content": "\u203c CVE-2021-34590 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:18.000000Z"}</description>
      <content:encoded>{"uuid": "46bd54eb-4754-460a-8d9a-c8661c1d388d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34590", "type": "seen", "source": "https://t.me/cibsecurity/41511", "content": "\u203c CVE-2021-34590 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/46bd54eb-4754-460a-8d9a-c8661c1d388d/export</guid>
      <pubDate>Wed, 27 Apr 2022 20:13:18 +0000</pubDate>
    </item>
    <item>
      <title>e5edf572-42d9-4a68-8639-7adef8fde42b</title>
      <link>https://db.gcve.eu/sighting/e5edf572-42d9-4a68-8639-7adef8fde42b/export</link>
      <description>{"uuid": "e5edf572-42d9-4a68-8639-7adef8fde42b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34591", "type": "seen", "source": "https://t.me/cibsecurity/41515", "content": "\u203c CVE-2021-34591 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:23.000000Z"}</description>
      <content:encoded>{"uuid": "e5edf572-42d9-4a68-8639-7adef8fde42b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34591", "type": "seen", "source": "https://t.me/cibsecurity/41515", "content": "\u203c CVE-2021-34591 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e5edf572-42d9-4a68-8639-7adef8fde42b/export</guid>
      <pubDate>Wed, 27 Apr 2022 20:13:23 +0000</pubDate>
    </item>
    <item>
      <title>fa7cdbbf-9b9d-4619-8ba4-0b7a1118e5f5</title>
      <link>https://db.gcve.eu/sighting/fa7cdbbf-9b9d-4619-8ba4-0b7a1118e5f5/export</link>
      <description>{"uuid": "fa7cdbbf-9b9d-4619-8ba4-0b7a1118e5f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34592", "type": "seen", "source": "https://t.me/cibsecurity/41516", "content": "\u203c CVE-2021-34592 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:24.000000Z"}</description>
      <content:encoded>{"uuid": "fa7cdbbf-9b9d-4619-8ba4-0b7a1118e5f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34592", "type": "seen", "source": "https://t.me/cibsecurity/41516", "content": "\u203c CVE-2021-34592 \u203c\n\nIn Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-27T20:13:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fa7cdbbf-9b9d-4619-8ba4-0b7a1118e5f5/export</guid>
      <pubDate>Wed, 27 Apr 2022 20:13:24 +0000</pubDate>
    </item>
    <item>
      <title>fb4492dd-d25e-46dd-b135-e4a994ae2fb1</title>
      <link>https://db.gcve.eu/sighting/fb4492dd-d25e-46dd-b135-e4a994ae2fb1/export</link>
      <description>{"uuid": "fb4492dd-d25e-46dd-b135-e4a994ae2fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-34593", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "fb4492dd-d25e-46dd-b135-e4a994ae2fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-34593", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fb4492dd-d25e-46dd-b135-e4a994ae2fb1/export</guid>
      <pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate>
    </item>
    <item>
      <title>64d5cfee-f882-457a-88a8-7695a1653ac7</title>
      <link>https://db.gcve.eu/sighting/64d5cfee-f882-457a-88a8-7695a1653ac7/export</link>
      <description>{"uuid": "64d5cfee-f882-457a-88a8-7695a1653ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-34595", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "64d5cfee-f882-457a-88a8-7695a1653ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-34595", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/64d5cfee-f882-457a-88a8-7695a1653ac7/export</guid>
      <pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate>
    </item>
    <item>
      <title>d3df1286-6cbe-4593-8422-7c0754c701cd</title>
      <link>https://db.gcve.eu/sighting/d3df1286-6cbe-4593-8422-7c0754c701cd/export</link>
      <description>{"uuid": "d3df1286-6cbe-4593-8422-7c0754c701cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-34596", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "d3df1286-6cbe-4593-8422-7c0754c701cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-34596", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d3df1286-6cbe-4593-8422-7c0754c701cd/export</guid>
      <pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
