<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 08:56:03 +0000</lastBuildDate>
    <item>
      <title>563631d8-c084-4996-b188-0e051c5099ec</title>
      <link>https://vulnerability.circl.lu/sighting/563631d8-c084-4996-b188-0e051c5099ec/export</link>
      <description>{"uuid": "563631d8-c084-4996-b188-0e051c5099ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9332", "type": "seen", "source": "https://t.me/SecLabNews/7869", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 SentinelOne \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043e\u043f\u0430\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0448\u0438\u043d\u044b USB for Remote Desktop \u043e\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 FabulaTech, \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u043e\u0432\u044b\u0432\u0430\u044e\u0449\u0435\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 USB-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-9332) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u0443\u0442\u0435\u043c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.  \n   \u041a\u043b\u0438\u0435\u043d\u0442\u0430\u043c\u0438 FabulaTech \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 Google, Microsoft, Texas Instruments, BMW, MasterCard, NASA, Reuters, Intel, Chevron, Shell, Raytheon, Xerox, General Electric, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0413\u0430\u0440\u0432\u0430\u0440\u0434\u0441\u043a\u0438\u0439 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0438 Raiffeisen Bank.\n\u0412 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0448\u0438\u043d\u044b \u043e\u0442 FabulaTech \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-09-20T22:07:59.000000Z"}</description>
      <content:encoded>{"uuid": "563631d8-c084-4996-b188-0e051c5099ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9332", "type": "seen", "source": "https://t.me/SecLabNews/7869", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 SentinelOne \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043e\u043f\u0430\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0448\u0438\u043d\u044b USB for Remote Desktop \u043e\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 FabulaTech, \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u043e\u0432\u044b\u0432\u0430\u044e\u0449\u0435\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 USB-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-9332) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u0443\u0442\u0435\u043c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.  \n   \u041a\u043b\u0438\u0435\u043d\u0442\u0430\u043c\u0438 FabulaTech \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 Google, Microsoft, Texas Instruments, BMW, MasterCard, NASA, Reuters, Intel, Chevron, Shell, Raytheon, Xerox, General Electric, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0413\u0430\u0440\u0432\u0430\u0440\u0434\u0441\u043a\u0438\u0439 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0438 Raiffeisen Bank.\n\u0412 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0448\u0438\u043d\u044b \u043e\u0442 FabulaTech \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-09-20T22:07:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/563631d8-c084-4996-b188-0e051c5099ec/export</guid>
      <pubDate>Sun, 20 Sep 2020 22:07:59 +0000</pubDate>
    </item>
    <item>
      <title>34c23857-8db8-46d0-a822-a75313a3a4e2</title>
      <link>https://vulnerability.circl.lu/sighting/34c23857-8db8-46d0-a822-a75313a3a4e2/export</link>
      <description>{"uuid": "34c23857-8db8-46d0-a822-a75313a3a4e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9332", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1287", "content": "#Hardware_Security\nNew Attack Vector that Allows Attackers to Create Fake USB Devices:\nAnalysis of CVE-2020-9332, a Vulnerable USB Redirection Software (PoC)\nhttps://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/", "creation_timestamp": "2024-10-29T18:31:42.000000Z"}</description>
      <content:encoded>{"uuid": "34c23857-8db8-46d0-a822-a75313a3a4e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9332", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1287", "content": "#Hardware_Security\nNew Attack Vector that Allows Attackers to Create Fake USB Devices:\nAnalysis of CVE-2020-9332, a Vulnerable USB Redirection Software (PoC)\nhttps://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/", "creation_timestamp": "2024-10-29T18:31:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34c23857-8db8-46d0-a822-a75313a3a4e2/export</guid>
      <pubDate>Tue, 29 Oct 2024 18:31:42 +0000</pubDate>
    </item>
  </channel>
</rss>
