<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T03:44:15.303319+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2bcbb861-cbc7-4a9a-9746-59f647d4c84d/export</id>
    <title>2bcbb861-cbc7-4a9a-9746-59f647d4c84d</title>
    <updated>2026-05-10T03:44:15.612652+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2bcbb861-cbc7-4a9a-9746-59f647d4c84d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9105", "type": "seen", "source": "https://t.me/cibsecurity/15178", "content": "\u203c CVE-2020-9105 \u203c\n\nTaurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-09T16:33:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2bcbb861-cbc7-4a9a-9746-59f647d4c84d/export"/>
    <published>2020-10-09T16:33:20+00:00</published>
  </entry>
</feed>
