<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 04:50:50 +0000</lastBuildDate>
    <item>
      <title>2bcbb861-cbc7-4a9a-9746-59f647d4c84d</title>
      <link>https://vulnerability.circl.lu/sighting/2bcbb861-cbc7-4a9a-9746-59f647d4c84d/export</link>
      <description>{"uuid": "2bcbb861-cbc7-4a9a-9746-59f647d4c84d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9105", "type": "seen", "source": "https://t.me/cibsecurity/15178", "content": "\u203c CVE-2020-9105 \u203c\n\nTaurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-09T16:33:20.000000Z"}</description>
      <content:encoded>{"uuid": "2bcbb861-cbc7-4a9a-9746-59f647d4c84d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9105", "type": "seen", "source": "https://t.me/cibsecurity/15178", "content": "\u203c CVE-2020-9105 \u203c\n\nTaurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-09T16:33:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2bcbb861-cbc7-4a9a-9746-59f647d4c84d/export</guid>
      <pubDate>Fri, 09 Oct 2020 16:33:20 +0000</pubDate>
    </item>
  </channel>
</rss>
