<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T16:33:13.896109+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/27d057fa-587b-4b33-8349-b2f7e802080a/export</id>
    <title>27d057fa-587b-4b33-8349-b2f7e802080a</title>
    <updated>2026-05-04T16:33:14.282296+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "27d057fa-587b-4b33-8349-b2f7e802080a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-15555", "type": "seen", "source": "https://t.me/cibsecurity/5205", "content": "ATENTION\u203c New - CVE-2018-15555\n\nOn Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user \"root\" and password \"admin\" by using the enabled onboard UART headers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-06-28T18:34:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/27d057fa-587b-4b33-8349-b2f7e802080a/export"/>
    <published>2019-06-28T18:34:15+00:00</published>
  </entry>
</feed>
