<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:32:06.390824+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d210bfd7-ea93-4578-84e4-438903e47d76/export</id>
    <title>d210bfd7-ea93-4578-84e4-438903e47d76</title>
    <updated>2026-05-06T11:32:06.797260+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d210bfd7-ea93-4578-84e4-438903e47d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1948", "type": "published-proof-of-concept", "source": "Telegram/Tvd8QL4SENBdyhrOX8ClGh5gThmxL9s_lOp2aXg1VdaPgg", "content": "", "creation_timestamp": "2021-08-02T20:29:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d210bfd7-ea93-4578-84e4-438903e47d76/export"/>
    <published>2021-08-02T20:29:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/595d63b2-6a06-4e46-9627-4639ac65963e/export</id>
    <title>595d63b2-6a06-4e46-9627-4639ac65963e</title>
    <updated>2026-05-06T11:32:06.797111+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "595d63b2-6a06-4e46-9627-4639ac65963e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/509", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 29 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-23T21:20:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/595d63b2-6a06-4e46-9627-4639ac65963e/export"/>
    <published>2023-11-23T21:20:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1e1a3245-bfbc-47c2-a92a-5c5308aff6b2/export</id>
    <title>1e1a3245-bfbc-47c2-a92a-5c5308aff6b2</title>
    <updated>2026-05-06T11:32:06.795083+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1e1a3245-bfbc-47c2-a92a-5c5308aff6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1948", "type": "seen", "source": "https://t.me/arpsyndicate/2017", "content": "#ExploitObserverAlert\n\nCVE-2020-1948\n\nDESCRIPTION: Exploit Observer has 31 entries related to CVE-2020-1948. This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.\n\nFIRST-EPSS: 0.004080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T15:54:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1e1a3245-bfbc-47c2-a92a-5c5308aff6b2/export"/>
    <published>2023-12-18T15:54:31+00:00</published>
  </entry>
</feed>
