<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 11:26:11 +0000</lastBuildDate>
    <item>
      <title>4fb9e973-ea4f-49c8-a0f1-4c28fb2261cc</title>
      <link>https://vulnerability.circl.lu/sighting/4fb9e973-ea4f-49c8-a0f1-4c28fb2261cc/export</link>
      <description>{"uuid": "4fb9e973-ea4f-49c8-a0f1-4c28fb2261cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/17993", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T20:32:39.000000Z"}</description>
      <content:encoded>{"uuid": "4fb9e973-ea4f-49c8-a0f1-4c28fb2261cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/17993", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T20:32:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4fb9e973-ea4f-49c8-a0f1-4c28fb2261cc/export</guid>
      <pubDate>Wed, 09 Dec 2020 20:32:39 +0000</pubDate>
    </item>
    <item>
      <title>10fc1bf6-555c-4436-8bc6-b0311284bf3d</title>
      <link>https://vulnerability.circl.lu/sighting/10fc1bf6-555c-4436-8bc6-b0311284bf3d/export</link>
      <description>{"uuid": "10fc1bf6-555c-4436-8bc6-b0311284bf3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18013", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T20:35:41.000000Z"}</description>
      <content:encoded>{"uuid": "10fc1bf6-555c-4436-8bc6-b0311284bf3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18013", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T20:35:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/10fc1bf6-555c-4436-8bc6-b0311284bf3d/export</guid>
      <pubDate>Wed, 09 Dec 2020 20:35:41 +0000</pubDate>
    </item>
    <item>
      <title>f1e060fe-b866-437e-ac87-69ed18f1a6f1</title>
      <link>https://vulnerability.circl.lu/sighting/f1e060fe-b866-437e-ac87-69ed18f1a6f1/export</link>
      <description>{"uuid": "f1e060fe-b866-437e-ac87-69ed18f1a6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18032", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T20:44:36.000000Z"}</description>
      <content:encoded>{"uuid": "f1e060fe-b866-437e-ac87-69ed18f1a6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18032", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T20:44:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f1e060fe-b866-437e-ac87-69ed18f1a6f1/export</guid>
      <pubDate>Wed, 09 Dec 2020 20:44:36 +0000</pubDate>
    </item>
    <item>
      <title>f9936e95-da4a-4ca4-ac15-b3da8c5c6f71</title>
      <link>https://vulnerability.circl.lu/sighting/f9936e95-da4a-4ca4-ac15-b3da8c5c6f71/export</link>
      <description>{"uuid": "f9936e95-da4a-4ca4-ac15-b3da8c5c6f71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18051", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T21:02:21.000000Z"}</description>
      <content:encoded>{"uuid": "f9936e95-da4a-4ca4-ac15-b3da8c5c6f71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18051", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T21:02:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9936e95-da4a-4ca4-ac15-b3da8c5c6f71/export</guid>
      <pubDate>Wed, 09 Dec 2020 21:02:21 +0000</pubDate>
    </item>
    <item>
      <title>c7bc7c39-7689-45e7-8634-f70a648eaeaa</title>
      <link>https://vulnerability.circl.lu/sighting/c7bc7c39-7689-45e7-8634-f70a648eaeaa/export</link>
      <description>{"uuid": "c7bc7c39-7689-45e7-8634-f70a648eaeaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18070", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T21:22:46.000000Z"}</description>
      <content:encoded>{"uuid": "c7bc7c39-7689-45e7-8634-f70a648eaeaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18070", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T21:22:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c7bc7c39-7689-45e7-8634-f70a648eaeaa/export</guid>
      <pubDate>Wed, 09 Dec 2020 21:22:46 +0000</pubDate>
    </item>
    <item>
      <title>c42cb383-141e-44a9-9281-9897c48383d3</title>
      <link>https://vulnerability.circl.lu/sighting/c42cb383-141e-44a9-9281-9897c48383d3/export</link>
      <description>{"uuid": "c42cb383-141e-44a9-9281-9897c48383d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18090", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T21:25:12.000000Z"}</description>
      <content:encoded>{"uuid": "c42cb383-141e-44a9-9281-9897c48383d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18090", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T21:25:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c42cb383-141e-44a9-9281-9897c48383d3/export</guid>
      <pubDate>Wed, 09 Dec 2020 21:25:12 +0000</pubDate>
    </item>
    <item>
      <title>8049847b-52cc-4510-8a3d-d14768fbf109</title>
      <link>https://vulnerability.circl.lu/sighting/8049847b-52cc-4510-8a3d-d14768fbf109/export</link>
      <description>{"uuid": "8049847b-52cc-4510-8a3d-d14768fbf109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18109", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T22:22:47.000000Z"}</description>
      <content:encoded>{"uuid": "8049847b-52cc-4510-8a3d-d14768fbf109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18109", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T22:22:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8049847b-52cc-4510-8a3d-d14768fbf109/export</guid>
      <pubDate>Wed, 09 Dec 2020 22:22:47 +0000</pubDate>
    </item>
    <item>
      <title>52ebaeb3-f84b-4efd-bb97-5fda46953e88</title>
      <link>https://vulnerability.circl.lu/sighting/52ebaeb3-f84b-4efd-bb97-5fda46953e88/export</link>
      <description>{"uuid": "52ebaeb3-f84b-4efd-bb97-5fda46953e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18129", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T22:25:08.000000Z"}</description>
      <content:encoded>{"uuid": "52ebaeb3-f84b-4efd-bb97-5fda46953e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2020", "type": "seen", "source": "https://t.me/cibsecurity/18129", "content": "\u203c CVE-2020-2020 \u203c\n\nAn improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T22:25:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/52ebaeb3-f84b-4efd-bb97-5fda46953e88/export</guid>
      <pubDate>Wed, 09 Dec 2020 22:25:08 +0000</pubDate>
    </item>
  </channel>
</rss>
