<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T02:39:22.050071+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4cd9e323-7ca0-496c-a29b-1d34b4750e45/export</id>
    <title>4cd9e323-7ca0-496c-a29b-1d34b4750e45</title>
    <updated>2026-05-05T02:39:30.141268+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4cd9e323-7ca0-496c-a29b-1d34b4750e45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2600", "type": "seen", "source": "https://t.me/cvedetector/21206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2600 - Devolutions Remote Desktop Manager Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-2600 \nPublished : March 26, 2025, 6:15 p.m. | 31\u00a0minutes ago \nDescription : Improper authorization in the variable component in Devolutions Remote Desktop Manager on Windows allows an authenticated password to use the ELEVATED_PASSWORD variable even though not allowed by the \"Allow password in variable policy\".   \n  \n  \n  \n  \n  \nThis issue affects Remote Desktop Manager versions from 2025.1.24 through 2025.1.25, and all versions up to 2024.3.29. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4cd9e323-7ca0-496c-a29b-1d34b4750e45/export"/>
    <published>2025-03-26T20:34:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2a2f849-7511-4bce-9360-9848d28f93a5/export</id>
    <title>f2a2f849-7511-4bce-9360-9848d28f93a5</title>
    <updated>2026-05-05T02:39:30.141189+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2a2f849-7511-4bce-9360-9848d28f93a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26005", "type": "seen", "source": "https://t.me/cvedetector/21221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26005 - Telesquare TLR-2005KSH Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26005 \nPublished : March 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 is vulnerable to unauthorized stack overflow vulnerability when requesting admin.cgi parameter with setNtp. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2a2f849-7511-4bce-9360-9848d28f93a5/export"/>
    <published>2025-03-26T22:15:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/afffccf6-e47d-41f0-9974-a245e0dfdf26/export</id>
    <title>afffccf6-e47d-41f0-9974-a245e0dfdf26</title>
    <updated>2026-05-05T02:39:30.141110+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "afffccf6-e47d-41f0-9974-a245e0dfdf26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26006", "type": "seen", "source": "https://t.me/cvedetector/21222", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26006 - Telesquare TLR-2005KSH Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26006 \nPublished : March 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 has an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setAutorest. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/afffccf6-e47d-41f0-9974-a245e0dfdf26/export"/>
    <published>2025-03-26T22:15:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/763bf026-e9f2-41b4-8542-ed2055292c00/export</id>
    <title>763bf026-e9f2-41b4-8542-ed2055292c00</title>
    <updated>2026-05-05T02:39:30.141027+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "763bf026-e9f2-41b4-8542-ed2055292c00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26008", "type": "seen", "source": "https://t.me/cvedetector/21224", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26008 - Telesquare TLR-2005KSH Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26008 \nPublished : March 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : In Telesquare TLR-2005KSH 1.1.4, an unauthorized stack overflow vulnerability exists when requesting admin.cgi parameter with setSyncTimeHost. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/763bf026-e9f2-41b4-8542-ed2055292c00/export"/>
    <published>2025-03-26T22:15:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d2cd0c37-0051-4387-9518-fa61e9121a6d/export</id>
    <title>d2cd0c37-0051-4387-9518-fa61e9121a6d</title>
    <updated>2026-05-05T02:39:30.140949+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d2cd0c37-0051-4387-9518-fa61e9121a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26007", "type": "seen", "source": "https://t.me/cvedetector/21223", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26007 - Telesquare TLR-2005KSH Stack Overflow Vulnerability in Login Interface\", \n  \"Content\": \"CVE ID : CVE-2025-26007 \nPublished : March 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 has an unauthorized stack overflow vulnerability in the login interface when requesting systemtil.cgi. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d2cd0c37-0051-4387-9518-fa61e9121a6d/export"/>
    <published>2025-03-26T22:15:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7bb282dc-b601-45c4-b645-5750b35ac468/export</id>
    <title>7bb282dc-b601-45c4-b645-5750b35ac468</title>
    <updated>2026-05-05T02:39:30.140866+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7bb282dc-b601-45c4-b645-5750b35ac468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26009", "type": "seen", "source": "https://t.me/cvedetector/21225", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26009 - Telesquare TLR-2005KSH Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26009 \nPublished : March 26, 2025, 8:15 p.m. | 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 has an Information Disclosure vulnerability when requesting systemutilit.cgi. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7bb282dc-b601-45c4-b645-5750b35ac468/export"/>
    <published>2025-03-26T22:15:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/83f1d627-8fce-4e9d-b2ff-dd1217a95815/export</id>
    <title>83f1d627-8fce-4e9d-b2ff-dd1217a95815</title>
    <updated>2026-05-05T02:39:30.140783+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "83f1d627-8fce-4e9d-b2ff-dd1217a95815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26001", "type": "seen", "source": "https://t.me/cvedetector/21226", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26001 - Telesquare TLR-2005KSH Authentication Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-26001 \nPublished : March 26, 2025, 7:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 is vulnerable to Information Disclosure via the parameter getUserNamePassword. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/83f1d627-8fce-4e9d-b2ff-dd1217a95815/export"/>
    <published>2025-03-26T22:15:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3747ce55-78b0-481a-8285-fd6f459be786/export</id>
    <title>3747ce55-78b0-481a-8285-fd6f459be786</title>
    <updated>2026-05-05T02:39:30.140692+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3747ce55-78b0-481a-8285-fd6f459be786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26002", "type": "seen", "source": "https://t.me/cvedetector/21227", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26002 - Telesquare TLR-2005KSH Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26002 \nPublished : March 26, 2025, 7:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 is affected by an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setSyncTimeHost. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3747ce55-78b0-481a-8285-fd6f459be786/export"/>
    <published>2025-03-26T22:15:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f91b693d-ce1f-4a37-b453-edeb21c0275c/export</id>
    <title>f91b693d-ce1f-4a37-b453-edeb21c0275c</title>
    <updated>2026-05-05T02:39:30.140549+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f91b693d-ce1f-4a37-b453-edeb21c0275c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26003", "type": "seen", "source": "https://t.me/cvedetector/21228", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26003 - Telesquare TLR-2005KSH Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26003 \nPublished : March 26, 2025, 7:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 is affected by an unauthorized command execution vulnerability when requesting the admin.cgi parameter with setAutorest. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f91b693d-ce1f-4a37-b453-edeb21c0275c/export"/>
    <published>2025-03-26T22:15:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/66b997a5-807d-42d7-ab5b-1efffca41b3b/export</id>
    <title>66b997a5-807d-42d7-ab5b-1efffca41b3b</title>
    <updated>2026-05-05T02:39:30.133467+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "66b997a5-807d-42d7-ab5b-1efffca41b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26004", "type": "seen", "source": "https://t.me/cvedetector/21231", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26004 - Telesquare TLR-2005KSH Stack Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-26004 \nPublished : March 26, 2025, 7:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Telesquare TLR-2005KSH 1.1.4 is vulnerable to unauthorized stack buffer overflow vulnerability when requesting admin.cgi parameter with setDdns. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/66b997a5-807d-42d7-ab5b-1efffca41b3b/export"/>
    <published>2025-03-26T22:15:41+00:00</published>
  </entry>
</feed>
