<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:37:26 +0000</lastBuildDate>
    <item>
      <title>6ec0c175-3b81-4efa-884b-f9dc63af7dc9</title>
      <link>https://vulnerability.circl.lu/sighting/6ec0c175-3b81-4efa-884b-f9dc63af7dc9/export</link>
      <description>{"uuid": "6ec0c175-3b81-4efa-884b-f9dc63af7dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "seen", "source": "https://t.me/BleepingComputer/7604", "content": "BitDefender fixes bug allowing attackers to run commands remotely\n\nSecurity solutions are designed to keep an organization safe, but that models crumble\u00a0when that same software becomes a threat vector for the attackers to exploit. Such is the case with a new Bitdefender remote code execution vulnerability, dubbed\u00a0CVE-2020-8102, lurking in its Safepay browser component. [...]\n\nhttps://www.bleepingcomputer.com/news/security/bitdefender-fixes-bug-allowing-attackers-to-run-commands-remotely/", "creation_timestamp": "2020-06-22T19:37:39.000000Z"}</description>
      <content:encoded>{"uuid": "6ec0c175-3b81-4efa-884b-f9dc63af7dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "seen", "source": "https://t.me/BleepingComputer/7604", "content": "BitDefender fixes bug allowing attackers to run commands remotely\n\nSecurity solutions are designed to keep an organization safe, but that models crumble\u00a0when that same software becomes a threat vector for the attackers to exploit. Such is the case with a new Bitdefender remote code execution vulnerability, dubbed\u00a0CVE-2020-8102, lurking in its Safepay browser component. [...]\n\nhttps://www.bleepingcomputer.com/news/security/bitdefender-fixes-bug-allowing-attackers-to-run-commands-remotely/", "creation_timestamp": "2020-06-22T19:37:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ec0c175-3b81-4efa-884b-f9dc63af7dc9/export</guid>
      <pubDate>Mon, 22 Jun 2020 19:37:39 +0000</pubDate>
    </item>
    <item>
      <title>2079f781-c1bc-4740-af44-37c13768e7f7</title>
      <link>https://vulnerability.circl.lu/sighting/2079f781-c1bc-4740-af44-37c13768e7f7/export</link>
      <description>{"uuid": "2079f781-c1bc-4740-af44-37c13768e7f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "seen", "source": "https://t.me/true_secator/694", "content": "\u0412\u0447\u0435\u0440\u0430 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-8102 \u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c \u0440\u0435\u0448\u0435\u043d\u0438\u0438 \u0440\u0443\u043c\u044b\u043d\u0441\u043a\u043e\u0439 Bitdefender.\n\n\u041e\u0448\u0438\u0431\u043a\u0430, \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0431\u043b\u043e\u0433\u0435\u0440\u043e\u043c \u0412\u043b\u0430\u0434\u0438\u043c\u0438\u0440\u043e\u043c \u041f\u0430\u043b\u0430\u043d\u0442\u043e\u043c, \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safepay, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0447\u0435\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 web-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u0434\u043b\u044f \u0432\u0435\u0440\u0441\u0438\u0438 Bitdefender 24.0.20. 116 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043e.\n\n\u042d\u0442\u043e \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u043f\u0435\u0440\u0432\u044b\u0439 \u0440\u0430\u0437, \u043a\u043e\u0433\u0434\u0430 \u0434\u044b\u0440\u043a\u0438 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0438\u043c\u0435\u043d\u043d\u043e \u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c \u041f\u041e. \u041f\u043e\u0445\u043e\u0436\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 2019 \u0433\u043e\u0434\u0443 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e. \u0412 \u043c\u0430\u0440\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u0433\u043e\u0434\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 JavaScript \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Avast. \u0410 \u043b\u0435\u0442\u043e\u043c \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u0442\u0430\u043a \u0432\u043e\u043e\u0431\u0449\u0435 \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0441\u0435\u0442\u044c \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u0439 Mitsubishi Electric \u0447\u0435\u0440\u0435\u0437 \u0434\u044b\u0440\u043a\u0443 \u0432 \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u043c \u0436\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0435 Trend Micro.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0432\u043e\u043f\u0440\u043e\u0441 \"\u041a\u0442\u043e \u0441\u0442\u0440\u0438\u0436\u0435\u0442 \u0446\u0438\u0440\u044e\u043b\u044c\u043d\u0438\u043a\u0430?\" \u043e\u0441\u0442\u0430\u0435\u0442\u0441\u044f \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c \u0432 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u043e\u0442\u0440\u0430\u0441\u043b\u0438.", "creation_timestamp": "2020-06-23T10:33:16.000000Z"}</description>
      <content:encoded>{"uuid": "2079f781-c1bc-4740-af44-37c13768e7f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "seen", "source": "https://t.me/true_secator/694", "content": "\u0412\u0447\u0435\u0440\u0430 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-8102 \u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c \u0440\u0435\u0448\u0435\u043d\u0438\u0438 \u0440\u0443\u043c\u044b\u043d\u0441\u043a\u043e\u0439 Bitdefender.\n\n\u041e\u0448\u0438\u0431\u043a\u0430, \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0431\u043b\u043e\u0433\u0435\u0440\u043e\u043c \u0412\u043b\u0430\u0434\u0438\u043c\u0438\u0440\u043e\u043c \u041f\u0430\u043b\u0430\u043d\u0442\u043e\u043c, \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safepay, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0447\u0435\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 web-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u0434\u043b\u044f \u0432\u0435\u0440\u0441\u0438\u0438 Bitdefender 24.0.20. 116 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043e.\n\n\u042d\u0442\u043e \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u043f\u0435\u0440\u0432\u044b\u0439 \u0440\u0430\u0437, \u043a\u043e\u0433\u0434\u0430 \u0434\u044b\u0440\u043a\u0438 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0438\u043c\u0435\u043d\u043d\u043e \u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c \u041f\u041e. \u041f\u043e\u0445\u043e\u0436\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 2019 \u0433\u043e\u0434\u0443 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e. \u0412 \u043c\u0430\u0440\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u0433\u043e\u0434\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 JavaScript \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Avast. \u0410 \u043b\u0435\u0442\u043e\u043c \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u0442\u0430\u043a \u0432\u043e\u043e\u0431\u0449\u0435 \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0441\u0435\u0442\u044c \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u0439 Mitsubishi Electric \u0447\u0435\u0440\u0435\u0437 \u0434\u044b\u0440\u043a\u0443 \u0432 \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u043c \u0436\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0435 Trend Micro.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0432\u043e\u043f\u0440\u043e\u0441 \"\u041a\u0442\u043e \u0441\u0442\u0440\u0438\u0436\u0435\u0442 \u0446\u0438\u0440\u044e\u043b\u044c\u043d\u0438\u043a\u0430?\" \u043e\u0441\u0442\u0430\u0435\u0442\u0441\u044f \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c \u0432 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u043e\u0442\u0440\u0430\u0441\u043b\u0438.", "creation_timestamp": "2020-06-23T10:33:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2079f781-c1bc-4740-af44-37c13768e7f7/export</guid>
      <pubDate>Tue, 23 Jun 2020 10:33:16 +0000</pubDate>
    </item>
    <item>
      <title>0abc3764-b3a7-4d98-95fd-58d1aa5237f9</title>
      <link>https://vulnerability.circl.lu/sighting/0abc3764-b3a7-4d98-95fd-58d1aa5237f9/export</link>
      <description>{"uuid": "0abc3764-b3a7-4d98-95fd-58d1aa5237f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "seen", "source": "https://t.me/SecLabNews/7908", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Bitdefender \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-8102 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Safepay \u0441\u0432\u043e\u0435\u0433\u043e \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Bitdefender Total Security 2020. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430 \u0434\u043e 24.0.20.116.    \n\u0412 Bitdefender Total Security 2020 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-10-06T07:25:38.000000Z"}</description>
      <content:encoded>{"uuid": "0abc3764-b3a7-4d98-95fd-58d1aa5237f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "seen", "source": "https://t.me/SecLabNews/7908", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Bitdefender \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-8102 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Safepay \u0441\u0432\u043e\u0435\u0433\u043e \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Bitdefender Total Security 2020. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430 \u0434\u043e 24.0.20.116.    \n\u0412 Bitdefender Total Security 2020 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-10-06T07:25:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0abc3764-b3a7-4d98-95fd-58d1aa5237f9/export</guid>
      <pubDate>Tue, 06 Oct 2020 07:25:38 +0000</pubDate>
    </item>
    <item>
      <title>f6908173-7120-4d55-bbb2-76ab7dc47382</title>
      <link>https://vulnerability.circl.lu/sighting/f6908173-7120-4d55-bbb2-76ab7dc47382/export</link>
      <description>{"uuid": "f6908173-7120-4d55-bbb2-76ab7dc47382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1308", "content": "#exploit\n1. CVE-2020-8163:\nRCE of user-provided\nlocal names in Rails &amp;lt;5.0.1\nhttps://github.com/sh286/CVE-2020-8163\n\n2. CVE-2020-8102:\nExploiting Bitdefender Antivirus (Total Security 2020 &amp;lt;24.0): RCE from any website\nhttps://palant.info/2020/06/22/exploiting-bitdefender-antivirus-rce-from-any-website", "creation_timestamp": "2024-10-29T18:56:13.000000Z"}</description>
      <content:encoded>{"uuid": "f6908173-7120-4d55-bbb2-76ab7dc47382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8102", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1308", "content": "#exploit\n1. CVE-2020-8163:\nRCE of user-provided\nlocal names in Rails &amp;lt;5.0.1\nhttps://github.com/sh286/CVE-2020-8163\n\n2. CVE-2020-8102:\nExploiting Bitdefender Antivirus (Total Security 2020 &amp;lt;24.0): RCE from any website\nhttps://palant.info/2020/06/22/exploiting-bitdefender-antivirus-rce-from-any-website", "creation_timestamp": "2024-10-29T18:56:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f6908173-7120-4d55-bbb2-76ab7dc47382/export</guid>
      <pubDate>Tue, 29 Oct 2024 18:56:13 +0000</pubDate>
    </item>
  </channel>
</rss>
