<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T00:15:50.061817+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9e851c4d-cc74-4f30-a2a4-abe01c39f763/export</id>
    <title>9e851c4d-cc74-4f30-a2a4-abe01c39f763</title>
    <updated>2026-05-09T00:15:50.309571+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9e851c4d-cc74-4f30-a2a4-abe01c39f763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55975", "type": "seen", "source": "https://t.me/cvedetector/13193", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55975 - Dr Affiliate SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-55975 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rohit Urane Dr Affiliate allows SQL Injection.This issue affects Dr Affiliate: from n/a through 1.2.3. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9e851c4d-cc74-4f30-a2a4-abe01c39f763/export"/>
    <published>2024-12-18T13:41:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b85ff64a-1276-459c-a7f2-1f47efb87a51/export</id>
    <title>b85ff64a-1276-459c-a7f2-1f47efb87a51</title>
    <updated>2026-05-09T00:15:50.309492+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b85ff64a-1276-459c-a7f2-1f47efb87a51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55976", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783252416684671", "content": "", "creation_timestamp": "2025-01-06T20:17:27.812473Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b85ff64a-1276-459c-a7f2-1f47efb87a51/export"/>
    <published>2025-01-06T20:17:27.812473+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dc3d95c9-b910-4b4f-827d-7b15d46180f2/export</id>
    <title>dc3d95c9-b910-4b4f-827d-7b15d46180f2</title>
    <updated>2026-05-09T00:15:50.309420+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dc3d95c9-b910-4b4f-827d-7b15d46180f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55972", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783252872567233", "content": "", "creation_timestamp": "2025-01-06T20:17:35.269516Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dc3d95c9-b910-4b4f-827d-7b15d46180f2/export"/>
    <published>2025-01-06T20:17:35.269516+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3f14bb2a-530b-40e5-9ca1-ba1787af785d/export</id>
    <title>3f14bb2a-530b-40e5-9ca1-ba1787af785d</title>
    <updated>2026-05-09T00:15:50.309341+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3f14bb2a-530b-40e5-9ca1-ba1787af785d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55978", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783256070082225", "content": "", "creation_timestamp": "2025-01-06T20:18:23.642886Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3f14bb2a-530b-40e5-9ca1-ba1787af785d/export"/>
    <published>2025-01-06T20:18:23.642886+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ff0fd33-641c-40a5-9cd8-aea23cc8af81/export</id>
    <title>4ff0fd33-641c-40a5-9cd8-aea23cc8af81</title>
    <updated>2026-05-09T00:15:50.309264+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ff0fd33-641c-40a5-9cd8-aea23cc8af81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55972", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lf62bczf3q2n", "content": "", "creation_timestamp": "2025-01-07T16:15:44.412500Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ff0fd33-641c-40a5-9cd8-aea23cc8af81/export"/>
    <published>2025-01-07T16:15:44.412500+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/81731076-dc2f-4501-9821-383e53b1ba46/export</id>
    <title>81731076-dc2f-4501-9821-383e53b1ba46</title>
    <updated>2026-05-09T00:15:50.309189+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "81731076-dc2f-4501-9821-383e53b1ba46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-55971", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878382120962576", "content": "", "creation_timestamp": "2025-01-23T15:30:12.524504Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/81731076-dc2f-4501-9821-383e53b1ba46/export"/>
    <published>2025-01-23T15:30:12.524504+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a115857f-fca2-4e02-9656-dbb4f481ffb4/export</id>
    <title>a115857f-fca2-4e02-9656-dbb4f481ffb4</title>
    <updated>2026-05-09T00:15:50.309108+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a115857f-fca2-4e02-9656-dbb4f481ffb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-55971", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878400757760231", "content": "", "creation_timestamp": "2025-01-23T15:34:56.510919Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a115857f-fca2-4e02-9656-dbb4f481ffb4/export"/>
    <published>2025-01-23T15:34:56.510919+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dfd426a5-43b2-41f6-80f0-3ee409285037/export</id>
    <title>dfd426a5-43b2-41f6-80f0-3ee409285037</title>
    <updated>2026-05-09T00:15:50.309016+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dfd426a5-43b2-41f6-80f0-3ee409285037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55971", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggbqlcvgi2r", "content": "", "creation_timestamp": "2025-01-23T16:16:02.510837Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dfd426a5-43b2-41f6-80f0-3ee409285037/export"/>
    <published>2025-01-23T16:16:02.510837+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/facb97b0-3073-4d5b-a3dd-2edb178a70b0/export</id>
    <title>facb97b0-3073-4d5b-a3dd-2edb178a70b0</title>
    <updated>2026-05-09T00:15:50.308900+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "facb97b0-3073-4d5b-a3dd-2edb178a70b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55975", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/facb97b0-3073-4d5b-a3dd-2edb178a70b0/export"/>
    <published>2025-09-15T13:28:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/da91e1d8-a3da-4e57-bbe9-04089cc7d994/export</id>
    <title>da91e1d8-a3da-4e57-bbe9-04089cc7d994</title>
    <updated>2026-05-09T00:15:50.306712+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "da91e1d8-a3da-4e57-bbe9-04089cc7d994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55975", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/da91e1d8-a3da-4e57-bbe9-04089cc7d994/export"/>
    <published>2025-09-16T03:45:06+00:00</published>
  </entry>
</feed>
