<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:00:04.288239+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c484b796-d78f-421b-ad34-6b87b8bef86f/export</id>
    <title>c484b796-d78f-421b-ad34-6b87b8bef86f</title>
    <updated>2026-05-04T17:00:04.714015+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c484b796-d78f-421b-ad34-6b87b8bef86f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27403", "type": "seen", "source": "https://t.me/cibsecurity/16115", "content": "\u203c CVE-2020-27403 \u203c\n\nA vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files &amp;amp; directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-10T20:27:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c484b796-d78f-421b-ad34-6b87b8bef86f/export"/>
    <published>2020-11-10T20:27:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9460c139-a355-4ca3-8c5c-6a26e380526e/export</id>
    <title>9460c139-a355-4ca3-8c5c-6a26e380526e</title>
    <updated>2026-05-04T17:00:04.711164+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9460c139-a355-4ca3-8c5c-6a26e380526e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27403", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2080", "content": "Critical Vulnerabilities Discovered in TCL Android TVs (Now World\u2019s 3rd Largest TV Manufacturer):\n- CVE-2020-27403 - Full file system browsing of the TV in the browser;\n- CVE-2020-28055 - World writable update folder (malicious updates possible)\nhttps://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/", "creation_timestamp": "2020-11-11T11:06:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9460c139-a355-4ca3-8c5c-6a26e380526e/export"/>
    <published>2020-11-11T11:06:01+00:00</published>
  </entry>
</feed>
