<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T20:51:29.181649+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f840552c-8ca5-49a3-86f2-b76cb7552d6e/export</id>
    <title>f840552c-8ca5-49a3-86f2-b76cb7552d6e</title>
    <updated>2026-05-08T20:51:29.477908+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f840552c-8ca5-49a3-86f2-b76cb7552d6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20409", "type": "seen", "source": "https://t.me/cibsecurity/13033", "content": "ATENTION\u203c New - CVE-2019-20409\n\nThe way in which velocity templates were used in Atlassian Jira Server and Data Center prior to version 8.8.0 allowed remote attackers to gain remote code execution if they were able to exploit a server side template injection vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-25T07:55:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f840552c-8ca5-49a3-86f2-b76cb7552d6e/export"/>
    <published>2020-06-25T07:55:41+00:00</published>
  </entry>
</feed>
