<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 22:16:02 +0000</lastBuildDate>
    <item>
      <title>6fd7773d-e9dd-4964-924c-4979152e0734</title>
      <link>https://vulnerability.circl.lu/sighting/6fd7773d-e9dd-4964-924c-4979152e0734/export</link>
      <description>{"uuid": "6fd7773d-e9dd-4964-924c-4979152e0734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11117", "type": "seen", "source": "https://t.me/cibsecurity/14513", "content": "ATENTION\u203c New - CVE-2020-11117\n\nu'In the lbd service, an external user can issue a specially crafted debug command to overwrite arbitrary files with arbitrary content resulting in remote code execution.' in Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA4531, QCA9531, QCA9980\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-08T14:55:35.000000Z"}</description>
      <content:encoded>{"uuid": "6fd7773d-e9dd-4964-924c-4979152e0734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11117", "type": "seen", "source": "https://t.me/cibsecurity/14513", "content": "ATENTION\u203c New - CVE-2020-11117\n\nu'In the lbd service, an external user can issue a specially crafted debug command to overwrite arbitrary files with arbitrary content resulting in remote code execution.' in Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA4531, QCA9531, QCA9980\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-08T14:55:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6fd7773d-e9dd-4964-924c-4979152e0734/export</guid>
      <pubDate>Tue, 08 Sep 2020 14:55:35 +0000</pubDate>
    </item>
  </channel>
</rss>
