<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T21:52:25.550374+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a28205a3-7093-4a42-a4c6-37eabf0c1d60/export</id>
    <title>a28205a3-7093-4a42-a4c6-37eabf0c1d60</title>
    <updated>2026-05-10T21:52:25.991815+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a28205a3-7093-4a42-a4c6-37eabf0c1d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34987", "type": "seen", "source": "https://t.me/Kelvinseccommunity/468", "content": "\ud83d\udea8 CVE-2024-34987\nA SQL Injection vulnerability exists in the ofrs/admin/index.php script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.\n\nhttps://t.me/Kelvinseccommunity\n\n#poc", "creation_timestamp": "2024-06-04T03:31:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a28205a3-7093-4a42-a4c6-37eabf0c1d60/export"/>
    <published>2024-06-04T03:31:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a2e9b88-c4a4-4d88-98c4-f3d32626f80b/export</id>
    <title>8a2e9b88-c4a4-4d88-98c4-f3d32626f80b</title>
    <updated>2026-05-10T21:52:25.989445+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a2e9b88-c4a4-4d88-98c4-f3d32626f80b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34987", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/537", "content": "\ud83d\udea8 CVE-2024-34987\nA SQL Injection vulnerability exists in the ofrs/admin/index.php script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.\n\nhttps://t.me/Kelvinseccommunity\n\n#poc", "creation_timestamp": "2024-06-04T03:31:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a2e9b88-c4a4-4d88-98c4-f3d32626f80b/export"/>
    <published>2024-06-04T03:31:49+00:00</published>
  </entry>
</feed>
