<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T16:26:45.453141+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7a308dee-1109-4e75-8677-984079cbaeda/export</id>
    <title>7a308dee-1109-4e75-8677-984079cbaeda</title>
    <updated>2026-05-10T16:26:45.978380+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7a308dee-1109-4e75-8677-984079cbaeda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22218", "type": "seen", "source": "https://t.me/cvedetector/3269", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22218 - Terminalfour XML JDBC XXE Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-22218 \nPublished : Aug. 15, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : XML External Entity (XXE) vulnerability in Terminalfour 8.0.0001 through 8.3.18 and XML JDBC versions up to 1.0.4 allows authenticated users to submit malicious XML via unspecified features which could lead to various actions such as accessing the underlying server, remote code execution (RCE), or performing Server-Side Request Forgery (SSRF) attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-15T20:59:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7a308dee-1109-4e75-8677-984079cbaeda/export"/>
    <published>2024-08-15T20:59:25+00:00</published>
  </entry>
</feed>
