<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with sqli]]></title><description><![CDATA[A list of topics that have been tagged with sqli]]></description><link>https://board.circlewithadot.net/tags/sqli</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:01:42 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/sqli.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🚨 CRITICAL SQL injection (CVE-2026-37749) in CodeAstro Simple Attendance Management System v1.0: Remote unauthenticated attackers can bypass authentication via index.php.]]></title><description><![CDATA[ CRITICAL SQL injection (CVE-2026-37749) in CodeAstro Simple Attendance Management System v1.0: Remote unauthenticated attackers can bypass authentication via index.php. Restrict access &amp; deploy WAFs until a patch arrives. https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc #OffSeq #SQLi #Infosec]]></description><link>https://board.circlewithadot.net/topic/993b5fa1-a48c-4ee7-8c5d-1304da153208/critical-sql-injection-cve-2026-37749-in-codeastro-simple-attendance-management-system-v1.0-remote-unauthenticated-attackers-can-bypass-authentication-via-index.php.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/993b5fa1-a48c-4ee7-8c5d-1304da153208/critical-sql-injection-cve-2026-37749-in-codeastro-simple-attendance-management-system-v1.0-remote-unauthenticated-attackers-can-bypass-authentication-via-index.php.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>