<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T12:42:02.188094+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/df172ff4-99cd-4581-b00e-0a81d20fa710/export</id>
    <title>df172ff4-99cd-4581-b00e-0a81d20fa710</title>
    <updated>2026-05-04T12:42:02.611486+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "df172ff4-99cd-4581-b00e-0a81d20fa710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29026", "type": "seen", "source": "https://t.me/cibsecurity/23601", "content": "\u203c CVE-2020-29026 \u203c\n\nA directory traversal vulnerability exists in the file upload function of the GateManager that allows an authenticated attacker with administrative permissions to read and write arbitrary files in the Linux file system. This issue affects: GateManager all versions prior to 9.2c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-15T18:46:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/df172ff4-99cd-4581-b00e-0a81d20fa710/export"/>
    <published>2021-02-15T18:46:46+00:00</published>
  </entry>
</feed>
