<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:34:06.367993+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ceb44c35-290c-4d94-8002-2eeda3103a2c/export</id>
    <title>ceb44c35-290c-4d94-8002-2eeda3103a2c</title>
    <updated>2026-05-04T17:34:06.761185+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ceb44c35-290c-4d94-8002-2eeda3103a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-7765", "type": "seen", "source": "https://t.me/cibsecurity/16340", "content": "\u203c CVE-2020-7765 \u203c\n\nThis affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-16T14:37:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ceb44c35-290c-4d94-8002-2eeda3103a2c/export"/>
    <published>2020-11-16T14:37:23+00:00</published>
  </entry>
</feed>
