<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T06:30:27.409811+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/14f64c49-d2e2-4899-b586-fc334565fa35/export</id>
    <title>14f64c49-d2e2-4899-b586-fc334565fa35</title>
    <updated>2026-05-06T06:30:27.781920+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "14f64c49-d2e2-4899-b586-fc334565fa35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44790", "type": "seen", "source": "https://t.me/cibsecurity/54252", "content": "\u203c CVE-2022-44790 \u203c\n\nInterspire Email Marketer through 6.5.1 allows SQL Injection via the surveys module. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if the survey id exists.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-10T02:37:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/14f64c49-d2e2-4899-b586-fc334565fa35/export"/>
    <published>2022-12-10T02:37:20+00:00</published>
  </entry>
</feed>
