<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T06:25:48.832042+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb92544f-3d3c-40c5-a3da-b047b0cd1610/export</id>
    <title>eb92544f-3d3c-40c5-a3da-b047b0cd1610</title>
    <updated>2026-05-08T06:25:49.210720+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb92544f-3d3c-40c5-a3da-b047b0cd1610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25507", "type": "seen", "source": "https://t.me/cibsecurity/21373", "content": "\u203c CVE-2020-25507 \u203c\n\nAn incorrect permission assignment (chmod 777) of /etc/environment during the installation script of No Magic TeamworkCloud 18.0 through 19.0 allows any local unprivileged user to write to /etc/environment. An attacker can escalate to root by writing arbitrary code to this file, which would be executed by root during the next login, reboot, or sourcing of the environment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T22:29:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb92544f-3d3c-40c5-a3da-b047b0cd1610/export"/>
    <published>2020-12-28T22:29:02+00:00</published>
  </entry>
</feed>
