<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 08:10:27 +0000</lastBuildDate>
    <item>
      <title>a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5</title>
      <link>https://db.gcve.eu/sighting/a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5/export</link>
      <description>{"uuid": "a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11920", "type": "seen", "source": "https://t.me/cibsecurity/23201", "content": "\u203c CVE-2020-11920 \u203c\n\nAn issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-08T07:38:55.000000Z"}</description>
      <content:encoded>{"uuid": "a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-11920", "type": "seen", "source": "https://t.me/cibsecurity/23201", "content": "\u203c CVE-2020-11920 \u203c\n\nAn issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-08T07:38:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a721f1bd-50b3-4e85-a7ad-b6e9d706bcd5/export</guid>
      <pubDate>Mon, 08 Feb 2021 07:38:55 +0000</pubDate>
    </item>
  </channel>
</rss>
