<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 07:59:58 +0000</lastBuildDate>
    <item>
      <title>19dfdb43-1712-45a0-8832-11c384ccb96c</title>
      <link>https://vulnerability.circl.lu/sighting/19dfdb43-1712-45a0-8832-11c384ccb96c/export</link>
      <description>{"uuid": "19dfdb43-1712-45a0-8832-11c384ccb96c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13541", "type": "seen", "source": "https://t.me/cibsecurity/21572", "content": "\u203c CVE-2020-13541 \u203c\n\nAn exploitable local privilege elevation vulnerability exists in the file system permissions of the Mobile-911 Server V2.5 install directory. Depending on the vector chosen, an attacker can overwrite the service executable and execute arbitrary code with System privileges or replace other files within the installation folder that could lead to local privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-05T19:25:17.000000Z"}</description>
      <content:encoded>{"uuid": "19dfdb43-1712-45a0-8832-11c384ccb96c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13541", "type": "seen", "source": "https://t.me/cibsecurity/21572", "content": "\u203c CVE-2020-13541 \u203c\n\nAn exploitable local privilege elevation vulnerability exists in the file system permissions of the Mobile-911 Server V2.5 install directory. Depending on the vector chosen, an attacker can overwrite the service executable and execute arbitrary code with System privileges or replace other files within the installation folder that could lead to local privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-05T19:25:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/19dfdb43-1712-45a0-8832-11c384ccb96c/export</guid>
      <pubDate>Tue, 05 Jan 2021 19:25:17 +0000</pubDate>
    </item>
  </channel>
</rss>
