<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 12:32:31 +0000</lastBuildDate>
    <item>
      <title>68b607db-360d-4059-ae39-4f5f62edb636</title>
      <link>https://vulnerability.circl.lu/sighting/68b607db-360d-4059-ae39-4f5f62edb636/export</link>
      <description>{"uuid": "68b607db-360d-4059-ae39-4f5f62edb636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-10008", "type": "seen", "source": "https://t.me/cibsecurity/56082", "content": "\u203c CVE-2013-10008 \u203c\n\nA vulnerability was found in sheilazpy eShop. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. The name of the patch is e096c5849c4dc09e1074104531014a62a5413884. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217572.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-07T00:24:38.000000Z"}</description>
      <content:encoded>{"uuid": "68b607db-360d-4059-ae39-4f5f62edb636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-10008", "type": "seen", "source": "https://t.me/cibsecurity/56082", "content": "\u203c CVE-2013-10008 \u203c\n\nA vulnerability was found in sheilazpy eShop. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. The name of the patch is e096c5849c4dc09e1074104531014a62a5413884. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217572.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-07T00:24:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/68b607db-360d-4059-ae39-4f5f62edb636/export</guid>
      <pubDate>Sat, 07 Jan 2023 00:24:38 +0000</pubDate>
    </item>
  </channel>
</rss>
