<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 13:39:36 +0000</lastBuildDate>
    <item>
      <title>a28205a3-7093-4a42-a4c6-37eabf0c1d60</title>
      <link>https://vulnerability.circl.lu/sighting/a28205a3-7093-4a42-a4c6-37eabf0c1d60/export</link>
      <description>{"uuid": "a28205a3-7093-4a42-a4c6-37eabf0c1d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34987", "type": "seen", "source": "https://t.me/Kelvinseccommunity/468", "content": "\ud83d\udea8 CVE-2024-34987\nA SQL Injection vulnerability exists in the ofrs/admin/index.php script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.\n\nhttps://t.me/Kelvinseccommunity\n\n#poc", "creation_timestamp": "2024-06-04T03:31:49.000000Z"}</description>
      <content:encoded>{"uuid": "a28205a3-7093-4a42-a4c6-37eabf0c1d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34987", "type": "seen", "source": "https://t.me/Kelvinseccommunity/468", "content": "\ud83d\udea8 CVE-2024-34987\nA SQL Injection vulnerability exists in the ofrs/admin/index.php script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.\n\nhttps://t.me/Kelvinseccommunity\n\n#poc", "creation_timestamp": "2024-06-04T03:31:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a28205a3-7093-4a42-a4c6-37eabf0c1d60/export</guid>
      <pubDate>Tue, 04 Jun 2024 03:31:49 +0000</pubDate>
    </item>
    <item>
      <title>8a2e9b88-c4a4-4d88-98c4-f3d32626f80b</title>
      <link>https://vulnerability.circl.lu/sighting/8a2e9b88-c4a4-4d88-98c4-f3d32626f80b/export</link>
      <description>{"uuid": "8a2e9b88-c4a4-4d88-98c4-f3d32626f80b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34987", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/537", "content": "\ud83d\udea8 CVE-2024-34987\nA SQL Injection vulnerability exists in the ofrs/admin/index.php script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.\n\nhttps://t.me/Kelvinseccommunity\n\n#poc", "creation_timestamp": "2024-06-04T03:31:49.000000Z"}</description>
      <content:encoded>{"uuid": "8a2e9b88-c4a4-4d88-98c4-f3d32626f80b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34987", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/537", "content": "\ud83d\udea8 CVE-2024-34987\nA SQL Injection vulnerability exists in the ofrs/admin/index.php script of PHPGurukul Online Fire Reporting System 1.2. The vulnerability allows attackers to bypass authentication and gain unauthorized access by injecting SQL commands into the username input field during the login process.\n\nhttps://t.me/Kelvinseccommunity\n\n#poc", "creation_timestamp": "2024-06-04T03:31:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8a2e9b88-c4a4-4d88-98c4-f3d32626f80b/export</guid>
      <pubDate>Tue, 04 Jun 2024 03:31:49 +0000</pubDate>
    </item>
  </channel>
</rss>
