<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T23:06:14.870828+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9cd352a8-8d7f-429f-a132-f00c7b2fc116/export</id>
    <title>9cd352a8-8d7f-429f-a132-f00c7b2fc116</title>
    <updated>2026-05-08T23:06:15.285432+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9cd352a8-8d7f-429f-a132-f00c7b2fc116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-40797", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116520794744579709", "content": "\ud83d\udd34 CRITICAL: CVE-2026-40797 in WebinarIgnition (\u22644.08.253) enables unauthenticated Blind SQL Injection. No patch yet \u2014 use WAF, validate inputs, restrict DB perms. High confidentiality risk. Details: https://radar.offseq.com/threat/cve-2026-40797-cwe-89-improper-neutralization-of-s-1958ecd4 #OffSeq #SQLInjection #WebinarIgnition", "creation_timestamp": "2026-05-05T07:30:29.069409Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9cd352a8-8d7f-429f-a132-f00c7b2fc116/export"/>
    <published>2026-05-05T07:30:29.069409+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0029d977-4c5f-40bb-902f-757831259d52/export</id>
    <title>0029d977-4c5f-40bb-902f-757831259d52</title>
    <updated>2026-05-08T23:06:15.285355+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0029d977-4c5f-40bb-902f-757831259d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-40797", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml3o4sriyd2j", "content": "CRITICAL: Blind SQL Injection in WebinarIgnition (\u22644.08.253) allows remote data extraction \u2014 no patch yet. Mitigate: strengthen input validation, use WAF. Stay alert for updates. https://radar.offseq.com/threat/cve-2026-40797-cwe-89-improper-neutralization-of-s-1958ecd4 #OffSeq #SQLInjection #Web...", "creation_timestamp": "2026-05-05T07:30:31.144430Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0029d977-4c5f-40bb-902f-757831259d52/export"/>
    <published>2026-05-05T07:30:31.144430+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9b20fb50-e842-4230-9d82-437d8faa64a6/export</id>
    <title>9b20fb50-e842-4230-9d82-437d8faa64a6</title>
    <updated>2026-05-08T23:06:15.285270+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9b20fb50-e842-4230-9d82-437d8faa64a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40797", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3ptvr53a2w", "content": "WebinarIgnition\u306eSQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u8106\u5f31\u6027\u306b\u3088\u308a\u3001\u653b\u6483\u8005\u306fWebinarIgnition\u306b\u767b\u9332\u3055\u308c\u305f\u60c5\u5831\u3092\u76d7\u307f\u51fa\u3059\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-40797 CVSS 9.3 | CRITICAL", "creation_timestamp": "2026-05-05T08:01:19.761068Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9b20fb50-e842-4230-9d82-437d8faa64a6/export"/>
    <published>2026-05-05T08:01:19.761068+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6579e275-76e8-4f97-8b8a-1d783906f513/export</id>
    <title>6579e275-76e8-4f97-8b8a-1d783906f513</title>
    <updated>2026-05-08T23:06:15.285147+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6579e275-76e8-4f97-8b8a-1d783906f513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40797", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3yugygs62i", "content": "CVE-2026-40797 - WordPress WebinarIgnition plugin\nCVE ID : CVE-2026-40797\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder LLC Webin...", "creation_timestamp": "2026-05-05T10:42:40.695207Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6579e275-76e8-4f97-8b8a-1d783906f513/export"/>
    <published>2026-05-05T10:42:40.695207+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb97f925-39a8-48f9-98cd-7e521f2610b1/export</id>
    <title>eb97f925-39a8-48f9-98cd-7e521f2610b1</title>
    <updated>2026-05-08T23:06:15.283042+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb97f925-39a8-48f9-98cd-7e521f2610b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40797", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml4vbhq6xw2q", "content": "\ud83d\udd34 CVE-2026-40797 - Critical (9.3)\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerabilit...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-40797/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-05T19:11:03.156465Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb97f925-39a8-48f9-98cd-7e521f2610b1/export"/>
    <published>2026-05-05T19:11:03.156465+00:00</published>
  </entry>
</feed>
