<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T08:10:28.092308+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5/export</id>
    <title>a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5</title>
    <updated>2026-05-01T08:10:28.443642+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11920", "type": "seen", "source": "https://t.me/cibsecurity/23201", "content": "\u203c CVE-2020-11920 \u203c\n\nAn issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-08T07:38:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5/export"/>
    <published>2021-02-08T07:38:55+00:00</published>
  </entry>
</feed>
