<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:25:50.498254+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6654fc20-3989-4d85-a7b6-15a8aeb1be58/export</id>
    <title>6654fc20-3989-4d85-a7b6-15a8aeb1be58</title>
    <updated>2026-05-06T19:25:50.892643+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6654fc20-3989-4d85-a7b6-15a8aeb1be58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24571", "type": "seen", "source": "https://t.me/cibsecurity/38173", "content": "\u203c CVE-2022-24571 \u203c\n\nCar Driving School Management System v1.0 is affected by SQL injection in the login page. An attacker can use simple SQL login injection payload to get admin access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-28T16:23:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6654fc20-3989-4d85-a7b6-15a8aeb1be58/export"/>
    <published>2022-02-28T16:23:15+00:00</published>
  </entry>
</feed>
