<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T16:25:09.188073+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/98bc0de0-c39d-4149-898e-f17d75aace64/export</id>
    <title>98bc0de0-c39d-4149-898e-f17d75aace64</title>
    <updated>2026-05-06T16:25:09.533011+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "98bc0de0-c39d-4149-898e-f17d75aace64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20283", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T19:25:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/98bc0de0-c39d-4149-898e-f17d75aace64/export"/>
    <published>2020-12-11T19:25:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/88f75fd7-7bec-4e4d-a3f1-7ed355decaf9/export</id>
    <title>88f75fd7-7bec-4e4d-a3f1-7ed355decaf9</title>
    <updated>2026-05-06T16:25:09.532912+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "88f75fd7-7bec-4e4d-a3f1-7ed355decaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20302", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T19:34:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/88f75fd7-7bec-4e4d-a3f1-7ed355decaf9/export"/>
    <published>2020-12-11T19:34:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a2c76728-340b-4c8a-a0bf-05b1451cdbb5/export</id>
    <title>a2c76728-340b-4c8a-a0bf-05b1451cdbb5</title>
    <updated>2026-05-06T16:25:09.532802+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a2c76728-340b-4c8a-a0bf-05b1451cdbb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20321", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:24:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a2c76728-340b-4c8a-a0bf-05b1451cdbb5/export"/>
    <published>2020-12-11T20:24:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/75519a30-3077-47dc-bae0-47f399d5f7af/export</id>
    <title>75519a30-3077-47dc-bae0-47f399d5f7af</title>
    <updated>2026-05-06T16:25:09.532697+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "75519a30-3077-47dc-bae0-47f399d5f7af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20341", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:25:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/75519a30-3077-47dc-bae0-47f399d5f7af/export"/>
    <published>2020-12-11T20:25:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7e0dcd83-9c73-4b89-8ca0-203bdae59ab7/export</id>
    <title>7e0dcd83-9c73-4b89-8ca0-203bdae59ab7</title>
    <updated>2026-05-06T16:25:09.532591+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7e0dcd83-9c73-4b89-8ca0-203bdae59ab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20351", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:35:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7e0dcd83-9c73-4b89-8ca0-203bdae59ab7/export"/>
    <published>2020-12-11T20:35:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/31abbae9-96ae-4d83-bda3-27e6a925b39a/export</id>
    <title>31abbae9-96ae-4d83-bda3-27e6a925b39a</title>
    <updated>2026-05-06T16:25:09.532473+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "31abbae9-96ae-4d83-bda3-27e6a925b39a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20371", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:45:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/31abbae9-96ae-4d83-bda3-27e6a925b39a/export"/>
    <published>2020-12-11T20:45:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8be80779-4e43-4a1d-b9cf-dcd46248b78a/export</id>
    <title>8be80779-4e43-4a1d-b9cf-dcd46248b78a</title>
    <updated>2026-05-06T16:25:09.532355+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8be80779-4e43-4a1d-b9cf-dcd46248b78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20390", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T21:25:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8be80779-4e43-4a1d-b9cf-dcd46248b78a/export"/>
    <published>2020-12-11T21:25:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b23fa280-a056-4827-a035-e9e0c9fe7835/export</id>
    <title>b23fa280-a056-4827-a035-e9e0c9fe7835</title>
    <updated>2026-05-06T16:25:09.532221+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b23fa280-a056-4827-a035-e9e0c9fe7835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20408", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:04:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b23fa280-a056-4827-a035-e9e0c9fe7835/export"/>
    <published>2020-12-11T22:04:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61d2cf35-7738-4d0b-b852-7de2614c7e5a/export</id>
    <title>61d2cf35-7738-4d0b-b852-7de2614c7e5a</title>
    <updated>2026-05-06T16:25:09.532033+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61d2cf35-7738-4d0b-b852-7de2614c7e5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20428", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:10:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61d2cf35-7738-4d0b-b852-7de2614c7e5a/export"/>
    <published>2020-12-11T22:10:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eaba1114-94d1-4f99-9615-3dd0601121e8/export</id>
    <title>eaba1114-94d1-4f99-9615-3dd0601121e8</title>
    <updated>2026-05-06T16:25:09.529013+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eaba1114-94d1-4f99-9615-3dd0601121e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20448", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:25:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eaba1114-94d1-4f99-9615-3dd0601121e8/export"/>
    <published>2020-12-11T22:25:07+00:00</published>
  </entry>
</feed>
