<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 01:14:38 +0000</lastBuildDate>
    <item>
      <title>4b7644b1-5ab9-4092-b997-add15dda4e7a</title>
      <link>https://vulnerability.circl.lu/sighting/4b7644b1-5ab9-4092-b997-add15dda4e7a/export</link>
      <description>{"uuid": "4b7644b1-5ab9-4092-b997-add15dda4e7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35931", "type": "seen", "source": "https://t.me/cibsecurity/21484", "content": "\u203c CVE-2020-35931 \u203c\n\nAn issue was discovered in Foxit Reader before 10.1.1 (and before 4.1.1 on macOS) and PhantomPDF before 9.7.5 and 10.x before 10.1.1 (and before 4.1.1 on macOS). An attacker can spoof a certified PDF document via an Evil Annotation Attack because the products fail to consider a null value for a Subtype entry of the Annotation dictionary, in an incremental update.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-01T00:31:54.000000Z"}</description>
      <content:encoded>{"uuid": "4b7644b1-5ab9-4092-b997-add15dda4e7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35931", "type": "seen", "source": "https://t.me/cibsecurity/21484", "content": "\u203c CVE-2020-35931 \u203c\n\nAn issue was discovered in Foxit Reader before 10.1.1 (and before 4.1.1 on macOS) and PhantomPDF before 9.7.5 and 10.x before 10.1.1 (and before 4.1.1 on macOS). An attacker can spoof a certified PDF document via an Evil Annotation Attack because the products fail to consider a null value for a Subtype entry of the Annotation dictionary, in an incremental update.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-01T00:31:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4b7644b1-5ab9-4092-b997-add15dda4e7a/export</guid>
      <pubDate>Fri, 01 Jan 2021 00:31:54 +0000</pubDate>
    </item>
  </channel>
</rss>
