<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:38:04 +0000</lastBuildDate>
    <item>
      <title>9c2f36b6-40cc-4de8-9444-7191de5829a8</title>
      <link>https://vulnerability.circl.lu/sighting/9c2f36b6-40cc-4de8-9444-7191de5829a8/export</link>
      <description>{"uuid": "9c2f36b6-40cc-4de8-9444-7191de5829a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7201", "type": "seen", "source": "https://t.me/cvedetector/1794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7201 - Simopro Technology WinMatrix3 Web Package SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7201 \nPublished : July 29, 2024, 3:15 a.m. | 38\u00a0minutes ago \nDescription : The login functionality of WinMatrix3 Web package from Simopro Technology lacks proper validation of user input, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T06:15:18.000000Z"}</description>
      <content:encoded>{"uuid": "9c2f36b6-40cc-4de8-9444-7191de5829a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7201", "type": "seen", "source": "https://t.me/cvedetector/1794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7201 - Simopro Technology WinMatrix3 Web Package SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7201 \nPublished : July 29, 2024, 3:15 a.m. | 38\u00a0minutes ago \nDescription : The login functionality of WinMatrix3 Web package from Simopro Technology lacks proper validation of user input, allowing unauthenticated remote attackers to inject SQL commands to read, modify, and delete database contents. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T06:15:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9c2f36b6-40cc-4de8-9444-7191de5829a8/export</guid>
      <pubDate>Mon, 29 Jul 2024 06:15:18 +0000</pubDate>
    </item>
  </channel>
</rss>
