<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:29:59.370075+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ea994eb-9980-4d2f-9950-4ac8fdc6b219/export</id>
    <title>9ea994eb-9980-4d2f-9950-4ac8fdc6b219</title>
    <updated>2026-05-04T10:29:59.766801+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ea994eb-9980-4d2f-9950-4ac8fdc6b219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19634", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T02:34:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ea994eb-9980-4d2f-9950-4ac8fdc6b219/export"/>
    <published>2020-12-11T02:34:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cba6ed1f-33dd-4ee6-8582-10f0947faa48/export</id>
    <title>cba6ed1f-33dd-4ee6-8582-10f0947faa48</title>
    <updated>2026-05-04T10:29:59.766702+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cba6ed1f-33dd-4ee6-8582-10f0947faa48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19654", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T02:37:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cba6ed1f-33dd-4ee6-8582-10f0947faa48/export"/>
    <published>2020-12-11T02:37:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b51be186-6cf6-4c26-922a-494c8f1130e4/export</id>
    <title>b51be186-6cf6-4c26-922a-494c8f1130e4</title>
    <updated>2026-05-04T10:29:59.766600+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b51be186-6cf6-4c26-922a-494c8f1130e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19674", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T03:25:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b51be186-6cf6-4c26-922a-494c8f1130e4/export"/>
    <published>2020-12-11T03:25:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/825f8fe1-a8b5-4ce3-b249-b9e946273a01/export</id>
    <title>825f8fe1-a8b5-4ce3-b249-b9e946273a01</title>
    <updated>2026-05-04T10:29:59.766487+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "825f8fe1-a8b5-4ce3-b249-b9e946273a01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19694", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T04:25:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/825f8fe1-a8b5-4ce3-b249-b9e946273a01/export"/>
    <published>2020-12-11T04:25:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/80a485f0-318c-4d26-850d-c921ce7283dd/export</id>
    <title>80a485f0-318c-4d26-850d-c921ce7283dd</title>
    <updated>2026-05-04T10:29:59.766372+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "80a485f0-318c-4d26-850d-c921ce7283dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19714", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T05:25:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/80a485f0-318c-4d26-850d-c921ce7283dd/export"/>
    <published>2020-12-11T05:25:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e6883cfe-f784-4ed1-b9c7-902626a2eec3/export</id>
    <title>e6883cfe-f784-4ed1-b9c7-902626a2eec3</title>
    <updated>2026-05-04T10:29:59.766222+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e6883cfe-f784-4ed1-b9c7-902626a2eec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19734", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T06:25:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e6883cfe-f784-4ed1-b9c7-902626a2eec3/export"/>
    <published>2020-12-11T06:25:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b04b57a-8bfa-4550-9803-9393fe93a83d/export</id>
    <title>1b04b57a-8bfa-4550-9803-9393fe93a83d</title>
    <updated>2026-05-04T10:29:59.764503+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b04b57a-8bfa-4550-9803-9393fe93a83d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-4829", "type": "seen", "source": "https://t.me/cibsecurity/19754", "content": "\u203c CVE-2020-4829 \u203c\n\nIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:25:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b04b57a-8bfa-4550-9803-9393fe93a83d/export"/>
    <published>2020-12-11T07:25:24+00:00</published>
  </entry>
</feed>
