<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 17:47:50 +0000</lastBuildDate>
    <item>
      <title>eb92544f-3d3c-40c5-a3da-b047b0cd1610</title>
      <link>https://vulnerability.circl.lu/sighting/eb92544f-3d3c-40c5-a3da-b047b0cd1610/export</link>
      <description>{"uuid": "eb92544f-3d3c-40c5-a3da-b047b0cd1610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25507", "type": "seen", "source": "https://t.me/cibsecurity/21373", "content": "\u203c CVE-2020-25507 \u203c\n\nAn incorrect permission assignment (chmod 777) of /etc/environment during the installation script of No Magic TeamworkCloud 18.0 through 19.0 allows any local unprivileged user to write to /etc/environment. An attacker can escalate to root by writing arbitrary code to this file, which would be executed by root during the next login, reboot, or sourcing of the environment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T22:29:02.000000Z"}</description>
      <content:encoded>{"uuid": "eb92544f-3d3c-40c5-a3da-b047b0cd1610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25507", "type": "seen", "source": "https://t.me/cibsecurity/21373", "content": "\u203c CVE-2020-25507 \u203c\n\nAn incorrect permission assignment (chmod 777) of /etc/environment during the installation script of No Magic TeamworkCloud 18.0 through 19.0 allows any local unprivileged user to write to /etc/environment. An attacker can escalate to root by writing arbitrary code to this file, which would be executed by root during the next login, reboot, or sourcing of the environment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T22:29:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb92544f-3d3c-40c5-a3da-b047b0cd1610/export</guid>
      <pubDate>Mon, 28 Dec 2020 22:29:02 +0000</pubDate>
    </item>
  </channel>
</rss>
