<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T23:12:55.949197+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0f36e3d5-a1ba-410a-8922-ae9f6d51a1cf/export</id>
    <title>0f36e3d5-a1ba-410a-8922-ae9f6d51a1cf</title>
    <updated>2026-05-06T23:12:56.244456+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0f36e3d5-a1ba-410a-8922-ae9f6d51a1cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "seen", "source": "https://t.me/cibsecurity/59508", "content": "\u203c CVE-2021-36393 \u203c\n\nIn Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T00:13:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0f36e3d5-a1ba-410a-8922-ae9f6d51a1cf/export"/>
    <published>2023-03-07T00:13:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/845824e4-73f0-4c71-aabf-20366951c0af/export</id>
    <title>845824e4-73f0-4c71-aabf-20366951c0af</title>
    <updated>2026-05-06T23:12:56.244383+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "845824e4-73f0-4c71-aabf-20366951c0af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "Telegram/GaTpOqyDc8HYp7QSAHID-mMQfCk7lqveShZUxbbVzm3_EA", "content": "", "creation_timestamp": "2023-11-05T16:59:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/845824e4-73f0-4c71-aabf-20366951c0af/export"/>
    <published>2023-11-05T16:59:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/15202fad-9b99-45e2-8c70-96166e222dd1/export</id>
    <title>15202fad-9b99-45e2-8c70-96166e222dd1</title>
    <updated>2026-05-06T23:12:56.244313+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "15202fad-9b99-45e2-8c70-96166e222dd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "seen", "source": "https://t.me/arpsyndicate/1596", "content": "#ExploitObserverAlert\n\nCVE-2021-36393\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-36393. In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.\n\nFIRST-EPSS: 0.000760000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T01:53:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/15202fad-9b99-45e2-8c70-96166e222dd1/export"/>
    <published>2023-12-10T01:53:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d611f5f0-b665-4095-8f53-45035f6ff6e4/export</id>
    <title>d611f5f0-b665-4095-8f53-45035f6ff6e4</title>
    <updated>2026-05-06T23:12:56.244241+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d611f5f0-b665-4095-8f53-45035f6ff6e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5337", "content": "#Red_Team_Tactics\n1. Moodle: Blind SQL Injection (CVE-2021-36393) and Broken Access Control (CVE-2021-36397)\nhttps://0xkasper.com/articles/moodle-sql-injection-broken-access-control.html\n2. Understanding Process Ghosting in Detail\nhttps://dosxuz.gitlab.io/post/processghosting", "creation_timestamp": "2024-01-21T17:42:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d611f5f0-b665-4095-8f53-45035f6ff6e4/export"/>
    <published>2024-01-21T17:42:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/044f1a37-e9be-4da8-b5d3-53d58f1e6c03/export</id>
    <title>044f1a37-e9be-4da8-b5d3-53d58f1e6c03</title>
    <updated>2026-05-06T23:12:56.244170+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "044f1a37-e9be-4da8-b5d3-53d58f1e6c03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9327", "content": "#exploit\n1. CVE-2023-45158:\nweb2py notifySendHandler os command injection\nhttps://github.com/Evan-Zhangyf/CVE-2023-45158\n\n2. CVE-2021-36393:\nTime-based blind SQL injection on Moodle platforms\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit#cve-2021-36393-exploit\n\n3. The Blooket Redirect exploit\nhttps://github.com/VillainsRule/BlooketRedirect", "creation_timestamp": "2024-04-19T11:38:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/044f1a37-e9be-4da8-b5d3-53d58f1e6c03/export"/>
    <published>2024-04-19T11:38:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8ff21ea5-b31e-4993-bc28-0ebdb4c29c4e/export</id>
    <title>8ff21ea5-b31e-4993-bc28-0ebdb4c29c4e</title>
    <updated>2026-05-06T23:12:56.244088+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8ff21ea5-b31e-4993-bc28-0ebdb4c29c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "https://t.me/hitshare/1951", "content": "- CVE-2021-36393 Exploit\n\n+ Enabling SQL injection attacks that can lead to unauthorized database access\n+ Exploiting this vulnerability requires minimal privileges, such as a student role, and significantly compromises data confidentiality and integrity\n\nShare for everybody \n- Download  :\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit", "creation_timestamp": "2024-06-14T08:36:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8ff21ea5-b31e-4993-bc28-0ebdb4c29c4e/export"/>
    <published>2024-06-14T08:36:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/179811a5-56fa-4aeb-b980-3ed3a7e473ef/export</id>
    <title>179811a5-56fa-4aeb-b980-3ed3a7e473ef</title>
    <updated>2026-05-06T23:12:56.244013+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "179811a5-56fa-4aeb-b980-3ed3a7e473ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "https://t.me/islamiccyberteam/6728", "content": "- CVE-2021-36393 Exploit\n\n+ Enabling SQL injection attacks that can lead to unauthorized database access\n+ Exploiting this vulnerability requires minimal privileges, such as a student role, and significantly compromises data confidentiality and integrity\n\nShare for everybody \n- Download\u00a0 :\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit", "creation_timestamp": "2024-06-14T10:34:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/179811a5-56fa-4aeb-b980-3ed3a7e473ef/export"/>
    <published>2024-06-14T10:34:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3d0b354a-65a2-447c-b87b-9275d3a28d28/export</id>
    <title>3d0b354a-65a2-447c-b87b-9275d3a28d28</title>
    <updated>2026-05-06T23:12:56.243936+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3d0b354a-65a2-447c-b87b-9275d3a28d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/42133", "content": "- CVE-2021-36393 Exploit\n\n+ Enabling SQL injection attacks that can lead to unauthorized database access\n+ Exploiting this vulnerability requires minimal privileges, such as a student role, and significantly compromises data confidentiality and integrity\n\nShare for everybody \n- Download  :\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit", "creation_timestamp": "2024-06-16T14:56:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3d0b354a-65a2-447c-b87b-9275d3a28d28/export"/>
    <published>2024-06-16T14:56:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d2c48fd-011c-46c1-bc2d-b8069fa451bc/export</id>
    <title>7d2c48fd-011c-46c1-bc2d-b8069fa451bc</title>
    <updated>2026-05-06T23:12:56.243830+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d2c48fd-011c-46c1-bc2d-b8069fa451bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/12978", "content": "- CVE-2021-36393 Exploit\n\n+ Enabling SQL injection attacks that can lead to unauthorized database access\n+ Exploiting this vulnerability requires minimal privileges, such as a student role, and significantly compromises data confidentiality and integrity\n\nShare for everybody \n- Download  :\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit", "creation_timestamp": "2024-06-16T14:56:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d2c48fd-011c-46c1-bc2d-b8069fa451bc/export"/>
    <published>2024-06-16T14:56:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/12e77d90-62a3-405e-908b-aa25c4adfeaf/export</id>
    <title>12e77d90-62a3-405e-908b-aa25c4adfeaf</title>
    <updated>2026-05-06T23:12:56.242067+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "12e77d90-62a3-405e-908b-aa25c4adfeaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36393", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1635", "content": "#exploit\n1. CVE-2023-45158:\nweb2py notifySendHandler os command injection\nhttps://github.com/Evan-Zhangyf/CVE-2023-45158\n\n2. CVE-2021-36393:\nTime-based blind SQL injection on Moodle platforms\nhttps://github.com/T0X1Cx/CVE-2021-36393-Exploit#cve-2021-36393-exploit\n\n3. The Blooket Redirect exploit\nhttps://github.com/VillainsRule/BlooketRedirect", "creation_timestamp": "2024-08-16T08:43:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/12e77d90-62a3-405e-908b-aa25c4adfeaf/export"/>
    <published>2024-08-16T08:43:29+00:00</published>
  </entry>
</feed>
