<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:30:15 +0000</lastBuildDate>
    <item>
      <title>98bc0de0-c39d-4149-898e-f17d75aace64</title>
      <link>https://vulnerability.circl.lu/sighting/98bc0de0-c39d-4149-898e-f17d75aace64/export</link>
      <description>{"uuid": "98bc0de0-c39d-4149-898e-f17d75aace64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20283", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T19:25:29.000000Z"}</description>
      <content:encoded>{"uuid": "98bc0de0-c39d-4149-898e-f17d75aace64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20283", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T19:25:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/98bc0de0-c39d-4149-898e-f17d75aace64/export</guid>
      <pubDate>Fri, 11 Dec 2020 19:25:29 +0000</pubDate>
    </item>
    <item>
      <title>88f75fd7-7bec-4e4d-a3f1-7ed355decaf9</title>
      <link>https://vulnerability.circl.lu/sighting/88f75fd7-7bec-4e4d-a3f1-7ed355decaf9/export</link>
      <description>{"uuid": "88f75fd7-7bec-4e4d-a3f1-7ed355decaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20302", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T19:34:37.000000Z"}</description>
      <content:encoded>{"uuid": "88f75fd7-7bec-4e4d-a3f1-7ed355decaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20302", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T19:34:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/88f75fd7-7bec-4e4d-a3f1-7ed355decaf9/export</guid>
      <pubDate>Fri, 11 Dec 2020 19:34:37 +0000</pubDate>
    </item>
    <item>
      <title>a2c76728-340b-4c8a-a0bf-05b1451cdbb5</title>
      <link>https://vulnerability.circl.lu/sighting/a2c76728-340b-4c8a-a0bf-05b1451cdbb5/export</link>
      <description>{"uuid": "a2c76728-340b-4c8a-a0bf-05b1451cdbb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20321", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:24:30.000000Z"}</description>
      <content:encoded>{"uuid": "a2c76728-340b-4c8a-a0bf-05b1451cdbb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20321", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:24:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a2c76728-340b-4c8a-a0bf-05b1451cdbb5/export</guid>
      <pubDate>Fri, 11 Dec 2020 20:24:30 +0000</pubDate>
    </item>
    <item>
      <title>75519a30-3077-47dc-bae0-47f399d5f7af</title>
      <link>https://vulnerability.circl.lu/sighting/75519a30-3077-47dc-bae0-47f399d5f7af/export</link>
      <description>{"uuid": "75519a30-3077-47dc-bae0-47f399d5f7af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20341", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:25:31.000000Z"}</description>
      <content:encoded>{"uuid": "75519a30-3077-47dc-bae0-47f399d5f7af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20341", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:25:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/75519a30-3077-47dc-bae0-47f399d5f7af/export</guid>
      <pubDate>Fri, 11 Dec 2020 20:25:31 +0000</pubDate>
    </item>
    <item>
      <title>7e0dcd83-9c73-4b89-8ca0-203bdae59ab7</title>
      <link>https://vulnerability.circl.lu/sighting/7e0dcd83-9c73-4b89-8ca0-203bdae59ab7/export</link>
      <description>{"uuid": "7e0dcd83-9c73-4b89-8ca0-203bdae59ab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20351", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:35:33.000000Z"}</description>
      <content:encoded>{"uuid": "7e0dcd83-9c73-4b89-8ca0-203bdae59ab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20351", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:35:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7e0dcd83-9c73-4b89-8ca0-203bdae59ab7/export</guid>
      <pubDate>Fri, 11 Dec 2020 20:35:33 +0000</pubDate>
    </item>
    <item>
      <title>31abbae9-96ae-4d83-bda3-27e6a925b39a</title>
      <link>https://vulnerability.circl.lu/sighting/31abbae9-96ae-4d83-bda3-27e6a925b39a/export</link>
      <description>{"uuid": "31abbae9-96ae-4d83-bda3-27e6a925b39a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20371", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:45:48.000000Z"}</description>
      <content:encoded>{"uuid": "31abbae9-96ae-4d83-bda3-27e6a925b39a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20371", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T20:45:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/31abbae9-96ae-4d83-bda3-27e6a925b39a/export</guid>
      <pubDate>Fri, 11 Dec 2020 20:45:48 +0000</pubDate>
    </item>
    <item>
      <title>8be80779-4e43-4a1d-b9cf-dcd46248b78a</title>
      <link>https://vulnerability.circl.lu/sighting/8be80779-4e43-4a1d-b9cf-dcd46248b78a/export</link>
      <description>{"uuid": "8be80779-4e43-4a1d-b9cf-dcd46248b78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20390", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T21:25:09.000000Z"}</description>
      <content:encoded>{"uuid": "8be80779-4e43-4a1d-b9cf-dcd46248b78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20390", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T21:25:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8be80779-4e43-4a1d-b9cf-dcd46248b78a/export</guid>
      <pubDate>Fri, 11 Dec 2020 21:25:09 +0000</pubDate>
    </item>
    <item>
      <title>b23fa280-a056-4827-a035-e9e0c9fe7835</title>
      <link>https://vulnerability.circl.lu/sighting/b23fa280-a056-4827-a035-e9e0c9fe7835/export</link>
      <description>{"uuid": "b23fa280-a056-4827-a035-e9e0c9fe7835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20408", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:04:24.000000Z"}</description>
      <content:encoded>{"uuid": "b23fa280-a056-4827-a035-e9e0c9fe7835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20408", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:04:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b23fa280-a056-4827-a035-e9e0c9fe7835/export</guid>
      <pubDate>Fri, 11 Dec 2020 22:04:24 +0000</pubDate>
    </item>
    <item>
      <title>61d2cf35-7738-4d0b-b852-7de2614c7e5a</title>
      <link>https://vulnerability.circl.lu/sighting/61d2cf35-7738-4d0b-b852-7de2614c7e5a/export</link>
      <description>{"uuid": "61d2cf35-7738-4d0b-b852-7de2614c7e5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20428", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:10:35.000000Z"}</description>
      <content:encoded>{"uuid": "61d2cf35-7738-4d0b-b852-7de2614c7e5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20428", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:10:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61d2cf35-7738-4d0b-b852-7de2614c7e5a/export</guid>
      <pubDate>Fri, 11 Dec 2020 22:10:35 +0000</pubDate>
    </item>
    <item>
      <title>eaba1114-94d1-4f99-9615-3dd0601121e8</title>
      <link>https://vulnerability.circl.lu/sighting/eaba1114-94d1-4f99-9615-3dd0601121e8/export</link>
      <description>{"uuid": "eaba1114-94d1-4f99-9615-3dd0601121e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20448", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:25:07.000000Z"}</description>
      <content:encoded>{"uuid": "eaba1114-94d1-4f99-9615-3dd0601121e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29591", "type": "seen", "source": "https://t.me/cibsecurity/20448", "content": "\u203c CVE-2020-29591 \u203c\n\nVersions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:25:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eaba1114-94d1-4f99-9615-3dd0601121e8/export</guid>
      <pubDate>Fri, 11 Dec 2020 22:25:07 +0000</pubDate>
    </item>
  </channel>
</rss>
