<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 12 May 2026 17:01:07 +0000</lastBuildDate>
    <item>
      <title>b02568c9-7e08-4c1d-a0d4-720153bce7fd</title>
      <link>https://vulnerability.circl.lu/sighting/b02568c9-7e08-4c1d-a0d4-720153bce7fd/export</link>
      <description>{"uuid": "b02568c9-7e08-4c1d-a0d4-720153bce7fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14483", "type": "seen", "source": "https://t.me/cibsecurity/20924", "content": "\u203c CVE-2019-14483 \u203c\n\nAdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T18:41:40.000000Z"}</description>
      <content:encoded>{"uuid": "b02568c9-7e08-4c1d-a0d4-720153bce7fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14483", "type": "seen", "source": "https://t.me/cibsecurity/20924", "content": "\u203c CVE-2019-14483 \u203c\n\nAdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T18:41:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b02568c9-7e08-4c1d-a0d4-720153bce7fd/export</guid>
      <pubDate>Wed, 16 Dec 2020 18:41:40 +0000</pubDate>
    </item>
  </channel>
</rss>
