<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T23:23:35.986706+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f5a4082d-e3ed-46a0-a782-dbd6d8099ff9/export</id>
    <title>f5a4082d-e3ed-46a0-a782-dbd6d8099ff9</title>
    <updated>2026-05-09T23:23:36.361745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f5a4082d-e3ed-46a0-a782-dbd6d8099ff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35584", "type": "seen", "source": "https://t.me/cvedetector/7941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-35584 - Azure CRM Ajax.sql Injection\", \n  \"Content\": \"CVE ID : CVE-2024-35584 \nPublished : Oct. 15, 2024, 7:15 p.m. | 41\u00a0minutes ago \nDescription : SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from \"X-Forwarded-For\" header and appends it to a SQL INSERT statement directly, leading to SQL Injection. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-15T21:57:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f5a4082d-e3ed-46a0-a782-dbd6d8099ff9/export"/>
    <published>2024-10-15T21:57:41+00:00</published>
  </entry>
</feed>
