<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 06:41:26 +0000</lastBuildDate>
    <item>
      <title>f0e46a64-f040-45f3-8a15-98a24b9b01d6</title>
      <link>https://vulnerability.circl.lu/sighting/f0e46a64-f040-45f3-8a15-98a24b9b01d6/export</link>
      <description>{"uuid": "f0e46a64-f040-45f3-8a15-98a24b9b01d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/ctinow/164072", "content": "https://ift.tt/iBZtpEs\nCVE-2024-0267", "creation_timestamp": "2024-01-07T07:26:29.000000Z"}</description>
      <content:encoded>{"uuid": "f0e46a64-f040-45f3-8a15-98a24b9b01d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/ctinow/164072", "content": "https://ift.tt/iBZtpEs\nCVE-2024-0267", "creation_timestamp": "2024-01-07T07:26:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f0e46a64-f040-45f3-8a15-98a24b9b01d6/export</guid>
      <pubDate>Sun, 07 Jan 2024 07:26:29 +0000</pubDate>
    </item>
    <item>
      <title>5513534b-15af-4263-a177-03a5a181561c</title>
      <link>https://vulnerability.circl.lu/sighting/5513534b-15af-4263-a177-03a5a181561c/export</link>
      <description>{"uuid": "5513534b-15af-4263-a177-03a5a181561c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/arpsyndicate/2703", "content": "#ExploitObserverAlert\n\nCVE-2024-0267\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2024-0267. A vulnerability classified as critical was found in Kashipara Hospital Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component Parameter Handler. The manipulation of the argument email/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249823.", "creation_timestamp": "2024-01-09T02:25:30.000000Z"}</description>
      <content:encoded>{"uuid": "5513534b-15af-4263-a177-03a5a181561c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/arpsyndicate/2703", "content": "#ExploitObserverAlert\n\nCVE-2024-0267\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2024-0267. A vulnerability classified as critical was found in Kashipara Hospital Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component Parameter Handler. The manipulation of the argument email/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249823.", "creation_timestamp": "2024-01-09T02:25:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5513534b-15af-4263-a177-03a5a181561c/export</guid>
      <pubDate>Tue, 09 Jan 2024 02:25:30 +0000</pubDate>
    </item>
    <item>
      <title>0cba7a59-e78d-4df5-ad21-1bd7476c89a6</title>
      <link>https://vulnerability.circl.lu/sighting/0cba7a59-e78d-4df5-ad21-1bd7476c89a6/export</link>
      <description>{"uuid": "0cba7a59-e78d-4df5-ad21-1bd7476c89a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/ctinow/172991", "content": "https://ift.tt/zO9DN6B\nCVE-2024-0267 | Kashipara Hospital Management System up to 1.0 Parameter login.php email/password sql injection", "creation_timestamp": "2024-01-24T18:46:57.000000Z"}</description>
      <content:encoded>{"uuid": "0cba7a59-e78d-4df5-ad21-1bd7476c89a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0267", "type": "seen", "source": "https://t.me/ctinow/172991", "content": "https://ift.tt/zO9DN6B\nCVE-2024-0267 | Kashipara Hospital Management System up to 1.0 Parameter login.php email/password sql injection", "creation_timestamp": "2024-01-24T18:46:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0cba7a59-e78d-4df5-ad21-1bd7476c89a6/export</guid>
      <pubDate>Wed, 24 Jan 2024 18:46:57 +0000</pubDate>
    </item>
  </channel>
</rss>
