<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T11:07:58.267157+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/29dcbd50-c99a-4107-b5b4-6c34f9f9690f/export</id>
    <title>29dcbd50-c99a-4107-b5b4-6c34f9f9690f</title>
    <updated>2026-05-04T11:07:58.743408+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "29dcbd50-c99a-4107-b5b4-6c34f9f9690f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4541", "type": "seen", "source": "https://t.me/ctinow/160570", "content": "https://ift.tt/bOktUoR\nCVE-2023-4541", "creation_timestamp": "2023-12-29T16:26:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/29dcbd50-c99a-4107-b5b4-6c34f9f9690f/export"/>
    <published>2023-12-29T16:26:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/88a6ed9b-bf51-4a63-b43d-87128da041f2/export</id>
    <title>88a6ed9b-bf51-4a63-b43d-87128da041f2</title>
    <updated>2026-05-04T11:07:58.741262+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "88a6ed9b-bf51-4a63-b43d-87128da041f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4541", "type": "seen", "source": "https://t.me/cibsecurity/73991", "content": "\u203c\ufe0fCVE-2023-4541\u203c\ufe0f\n\nImproper Neutralization of Special Elements used in an SQL Command 'SQL Injection' vulnerability in Ween Software Admin Panel allows SQL Injection.This issue affects Admin Panel through 20231229.\u00a0  NOTE The vendor was contacted early about this disclosure but did not respond in any way.    \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:42:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/88a6ed9b-bf51-4a63-b43d-87128da041f2/export"/>
    <published>2023-12-30T01:42:08+00:00</published>
  </entry>
</feed>
