<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T10:54:22.184950+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/93eb047e-9622-406c-9ca6-b5c969aadf4e/export</id>
    <title>93eb047e-9622-406c-9ca6-b5c969aadf4e</title>
    <updated>2026-05-09T10:54:22.534412+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "93eb047e-9622-406c-9ca6-b5c969aadf4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14480", "type": "seen", "source": "https://t.me/cibsecurity/20927", "content": "\u203c CVE-2019-14480 \u203c\n\nAdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T18:41:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/93eb047e-9622-406c-9ca6-b5c969aadf4e/export"/>
    <published>2020-12-16T18:41:43+00:00</published>
  </entry>
</feed>
