<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 04:52:43 +0000</lastBuildDate>
    <item>
      <title>170c11eb-21d9-4f60-af2e-4b80146fded6</title>
      <link>https://vulnerability.circl.lu/sighting/170c11eb-21d9-4f60-af2e-4b80146fded6/export</link>
      <description>{"uuid": "170c11eb-21d9-4f60-af2e-4b80146fded6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8138", "type": "seen", "source": "https://t.me/cvedetector/4075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8138 - Vulnerability Title: Code-Projects Pharmacy Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8138 \nPublished : Aug. 25, 2024, 1:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in code-projects Pharmacy Management System 1.0. Affected is the function editManager of the file /index.php?action=editManager of the component Parameter Handler. The manipulation of the argument id as part of String leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-25T04:15:24.000000Z"}</description>
      <content:encoded>{"uuid": "170c11eb-21d9-4f60-af2e-4b80146fded6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8138", "type": "seen", "source": "https://t.me/cvedetector/4075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8138 - Vulnerability Title: Code-Projects Pharmacy Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8138 \nPublished : Aug. 25, 2024, 1:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in code-projects Pharmacy Management System 1.0. Affected is the function editManager of the file /index.php?action=editManager of the component Parameter Handler. The manipulation of the argument id as part of String leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-25T04:15:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/170c11eb-21d9-4f60-af2e-4b80146fded6/export</guid>
      <pubDate>Sun, 25 Aug 2024 04:15:24 +0000</pubDate>
    </item>
  </channel>
</rss>
