<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 16:06:55 +0000</lastBuildDate>
    <item>
      <title>de5d96e9-c275-4e83-b800-b588ec97604e</title>
      <link>https://vulnerability.circl.lu/sighting/de5d96e9-c275-4e83-b800-b588ec97604e/export</link>
      <description>{"uuid": "de5d96e9-c275-4e83-b800-b588ec97604e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-15039", "type": "seen", "source": "https://t.me/cvedetector/628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2016-15039 - A vulnerability classified as critical was found i\", \n  \"Content\": \"CVE ID : CVE-2016-15039 \nPublished : July 11, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T05:46:29.000000Z"}</description>
      <content:encoded>{"uuid": "de5d96e9-c275-4e83-b800-b588ec97604e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-15039", "type": "seen", "source": "https://t.me/cvedetector/628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2016-15039 - A vulnerability classified as critical was found i\", \n  \"Content\": \"CVE ID : CVE-2016-15039 \nPublished : July 11, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T05:46:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/de5d96e9-c275-4e83-b800-b588ec97604e/export</guid>
      <pubDate>Thu, 11 Jul 2024 05:46:29 +0000</pubDate>
    </item>
  </channel>
</rss>
