<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T08:59:44.808820+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5065f950-dcb4-473c-a675-d9cf8e698857/export</id>
    <title>5065f950-dcb4-473c-a675-d9cf8e698857</title>
    <updated>2026-05-06T08:59:45.216184+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5065f950-dcb4-473c-a675-d9cf8e698857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7188", "type": "seen", "source": "https://t.me/cibsecurity/74070", "content": "\u203c\ufe0fCVE-2023-7188\u203c\ufe0f\n\nA vulnerability classified as critical has been found in Shipping 100 Fahuo100 up to 1.1. Affected is an unknown function of the file memberlogin.php. The manipulation of the argument Mpwd leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB249390 is the identifier assigned to this vulnerability. NOTE The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:32:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5065f950-dcb4-473c-a675-d9cf8e698857/export"/>
    <published>2024-01-01T01:32:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b90524da-b54a-4b4e-82c9-5da19181428b/export</id>
    <title>b90524da-b54a-4b4e-82c9-5da19181428b</title>
    <updated>2026-05-06T08:59:45.213893+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b90524da-b54a-4b4e-82c9-5da19181428b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7188", "type": "seen", "source": "https://t.me/ctinow/171025", "content": "https://ift.tt/zBAd07a\nCVE-2023-7188 | Shipping 100 Fahuo100 up to 1.1 member/login.php M_pwd sql injection", "creation_timestamp": "2024-01-22T08:36:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b90524da-b54a-4b4e-82c9-5da19181428b/export"/>
    <published>2024-01-22T08:36:19+00:00</published>
  </entry>
</feed>
