<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T20:51:04.728743+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c6bc669-8c2d-4d26-88e2-76e8a7d4ae6c/export</id>
    <title>8c6bc669-8c2d-4d26-88e2-76e8a7d4ae6c</title>
    <updated>2026-05-04T20:51:05.084364+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c6bc669-8c2d-4d26-88e2-76e8a7d4ae6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44866", "type": "seen", "source": "https://t.me/cibsecurity/36772", "content": "\u203c CVE-2021-44866 \u203c\n\nAn issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-03T16:30:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c6bc669-8c2d-4d26-88e2-76e8a7d4ae6c/export"/>
    <published>2022-02-03T16:30:03+00:00</published>
  </entry>
</feed>
