<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:55:15.048322+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c795052-65d4-4870-a20e-85db10e9f2a1/export</id>
    <title>1c795052-65d4-4870-a20e-85db10e9f2a1</title>
    <updated>2026-05-06T09:55:15.411169+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c795052-65d4-4870-a20e-85db10e9f2a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-7244", "type": "seen", "source": "https://t.me/cveNotify/343", "content": "\ud83d\udea8 CVE-2020-7244\nComtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote code execution by navigating to the Poll Routes page and entering shell metacharacters in the Router IP Address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2020-01-21T01:37:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c795052-65d4-4870-a20e-85db10e9f2a1/export"/>
    <published>2020-01-21T01:37:41+00:00</published>
  </entry>
</feed>
