{"vulnerability": "CVE-2026-20048", "sightings": [{"uuid": "c1663009-10f1-48fc-8856-0772d09b5057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-20048", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfpavcvkkm2k", "creation_timestamp": "2026-02-25T17:55:46.502752Z"}, {"uuid": "19fee9d4-6b22-4e41-bf20-17118423fbd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-20048", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfpaty7kya2d", "creation_timestamp": "2026-02-25T17:55:01.572255Z"}, {"uuid": "6c446c76-2ab9-49d9-b269-450541f59e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-20048", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfpayblxbb25", "creation_timestamp": "2026-02-25T17:57:25.106813Z"}, {"uuid": "6e7ff464-8f47-4a49-860a-66cf17f180c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-20048", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mfrggi53ya2w", "creation_timestamp": "2026-02-26T14:40:09.527794Z"}, {"uuid": "186ae69c-d340-471f-9fa3-d847b4b6ca98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-20048", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevato-sfruttamento-di-vulnerabilita-in-prodotti-cisco", "creation_timestamp": "2026-02-25T17:29:05.000000Z"}]}