<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 05:36:29 +0000</lastBuildDate>
    <item>
      <title>2a5010e8-792a-45ce-a1af-184e66057be3</title>
      <link>https://vulnerability.circl.lu/sighting/2a5010e8-792a-45ce-a1af-184e66057be3/export</link>
      <description>{"uuid": "2a5010e8-792a-45ce-a1af-184e66057be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-20432", "type": "seen", "source": "https://t.me/cibsecurity/14639", "content": "ATENTION\u203c New - CVE-2018-20432\n\nD-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-14T18:55:13.000000Z"}</description>
      <content:encoded>{"uuid": "2a5010e8-792a-45ce-a1af-184e66057be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-20432", "type": "seen", "source": "https://t.me/cibsecurity/14639", "content": "ATENTION\u203c New - CVE-2018-20432\n\nD-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-14T18:55:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a5010e8-792a-45ce-a1af-184e66057be3/export</guid>
      <pubDate>Mon, 14 Sep 2020 18:55:13 +0000</pubDate>
    </item>
  </channel>
</rss>
