<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T06:41:27.126989+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f0e46a64-f040-45f3-8a15-98a24b9b01d6/export</id>
    <title>f0e46a64-f040-45f3-8a15-98a24b9b01d6</title>
    <updated>2026-05-10T06:41:27.520418+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f0e46a64-f040-45f3-8a15-98a24b9b01d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/ctinow/164072", "content": "https://ift.tt/iBZtpEs\nCVE-2024-0267", "creation_timestamp": "2024-01-07T07:26:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f0e46a64-f040-45f3-8a15-98a24b9b01d6/export"/>
    <published>2024-01-07T07:26:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5513534b-15af-4263-a177-03a5a181561c/export</id>
    <title>5513534b-15af-4263-a177-03a5a181561c</title>
    <updated>2026-05-10T06:41:27.520290+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5513534b-15af-4263-a177-03a5a181561c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/arpsyndicate/2703", "content": "#ExploitObserverAlert\n\nCVE-2024-0267\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2024-0267. A vulnerability classified as critical was found in Kashipara Hospital Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component Parameter Handler. The manipulation of the argument email/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249823.", "creation_timestamp": "2024-01-09T02:25:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5513534b-15af-4263-a177-03a5a181561c/export"/>
    <published>2024-01-09T02:25:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0cba7a59-e78d-4df5-ad21-1bd7476c89a6/export</id>
    <title>0cba7a59-e78d-4df5-ad21-1bd7476c89a6</title>
    <updated>2026-05-10T06:41:27.516715+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0cba7a59-e78d-4df5-ad21-1bd7476c89a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/ctinow/172991", "content": "https://ift.tt/zO9DN6B\nCVE-2024-0267 | Kashipara Hospital Management System up to 1.0 Parameter login.php email/password sql injection", "creation_timestamp": "2024-01-24T18:46:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0cba7a59-e78d-4df5-ad21-1bd7476c89a6/export"/>
    <published>2024-01-24T18:46:57+00:00</published>
  </entry>
</feed>
