<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 16:41:52 +0000</lastBuildDate>
    <item>
      <title>bda2b982-3ed1-4dbe-b89c-92b3f45b6bbd</title>
      <link>https://vulnerability.circl.lu/sighting/bda2b982-3ed1-4dbe-b89c-92b3f45b6bbd/export</link>
      <description>{"uuid": "bda2b982-3ed1-4dbe-b89c-92b3f45b6bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44600", "type": "seen", "source": "https://t.me/cibsecurity/34562", "content": "\u203c CVE-2021-44600 \u203c\n\nThe password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-23T16:19:10.000000Z"}</description>
      <content:encoded>{"uuid": "bda2b982-3ed1-4dbe-b89c-92b3f45b6bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44600", "type": "seen", "source": "https://t.me/cibsecurity/34562", "content": "\u203c CVE-2021-44600 \u203c\n\nThe password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-23T16:19:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bda2b982-3ed1-4dbe-b89c-92b3f45b6bbd/export</guid>
      <pubDate>Thu, 23 Dec 2021 16:19:10 +0000</pubDate>
    </item>
    <item>
      <title>fa7111ee-1a25-487f-ba2e-7354ab545582</title>
      <link>https://vulnerability.circl.lu/sighting/fa7111ee-1a25-487f-ba2e-7354ab545582/export</link>
      <description>{"uuid": "fa7111ee-1a25-487f-ba2e-7354ab545582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44607", "type": "seen", "source": "https://t.me/cibsecurity/38023", "content": "\u203c CVE-2021-44607 \u203c\n\nA Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T18:21:39.000000Z"}</description>
      <content:encoded>{"uuid": "fa7111ee-1a25-487f-ba2e-7354ab545582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44607", "type": "seen", "source": "https://t.me/cibsecurity/38023", "content": "\u203c CVE-2021-44607 \u203c\n\nA Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-24T18:21:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fa7111ee-1a25-487f-ba2e-7354ab545582/export</guid>
      <pubDate>Thu, 24 Feb 2022 18:21:39 +0000</pubDate>
    </item>
  </channel>
</rss>
