<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:30:19.656298+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/33b08926-8816-4a83-84fb-057442cd7ffd/export</id>
    <title>33b08926-8816-4a83-84fb-057442cd7ffd</title>
    <updated>2026-05-06T11:30:19.944511+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "33b08926-8816-4a83-84fb-057442cd7ffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27746", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aBlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748\nURL\uff1ahttps://github.com/eyJhb/blackvue-cve-2023\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-12T19:26:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/33b08926-8816-4a83-84fb-057442cd7ffd/export"/>
    <published>2023-04-12T19:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ea06f83-a505-4271-ac81-46cad599c1a2/export</id>
    <title>4ea06f83-a505-4271-ac81-46cad599c1a2</title>
    <updated>2026-05-06T11:30:19.944382+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ea06f83-a505-4271-ac81-46cad599c1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27748", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aBlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748\nURL\uff1ahttps://github.com/eyJhb/blackvue-cve-2023\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-12T19:26:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ea06f83-a505-4271-ac81-46cad599c1a2/export"/>
    <published>2023-04-12T19:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/15292748-f59b-4e6a-8cbd-c4c60b904082/export</id>
    <title>15292748-f59b-4e6a-8cbd-c4c60b904082</title>
    <updated>2026-05-06T11:30:19.944266+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "15292748-f59b-4e6a-8cbd-c4c60b904082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27748", "type": "seen", "source": "https://t.me/cibsecurity/62081", "content": "\u203c CVE-2023-27748 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/15292748-f59b-4e6a-8cbd-c4c60b904082/export"/>
    <published>2023-04-14T00:25:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0568793e-a77f-4f37-a1c7-cdc34c291aba/export</id>
    <title>0568793e-a77f-4f37-a1c7-cdc34c291aba</title>
    <updated>2026-05-06T11:30:19.944156+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0568793e-a77f-4f37-a1c7-cdc34c291aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27747", "type": "seen", "source": "https://t.me/cibsecurity/62085", "content": "\u203c CVE-2023-27747 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0568793e-a77f-4f37-a1c7-cdc34c291aba/export"/>
    <published>2023-04-14T00:25:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aac582ba-03f2-40ca-a89a-46abdd030ed0/export</id>
    <title>aac582ba-03f2-40ca-a89a-46abdd030ed0</title>
    <updated>2026-05-06T11:30:19.944043+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aac582ba-03f2-40ca-a89a-46abdd030ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27746", "type": "seen", "source": "https://t.me/cibsecurity/62093", "content": "\u203c CVE-2023-27746 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T03:22:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aac582ba-03f2-40ca-a89a-46abdd030ed0/export"/>
    <published>2023-05-09T03:22:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/728994e8-121a-4b93-9035-b39e1a674545/export</id>
    <title>728994e8-121a-4b93-9035-b39e1a674545</title>
    <updated>2026-05-06T11:30:19.943932+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "728994e8-121a-4b93-9035-b39e1a674545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27742", "type": "seen", "source": "https://t.me/cibsecurity/64271", "content": "\u203c CVE-2023-27742 \u203c\n\nIDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T00:32:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/728994e8-121a-4b93-9035-b39e1a674545/export"/>
    <published>2023-05-17T00:32:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/edfef691-93a9-41b5-aeb0-2ebbdf4442b6/export</id>
    <title>edfef691-93a9-41b5-aeb0-2ebbdf4442b6</title>
    <updated>2026-05-06T11:30:19.943795+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "edfef691-93a9-41b5-aeb0-2ebbdf4442b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/cibsecurity/64350", "content": "\u203c CVE-2023-2774 \u203c\n\nA vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T00:36:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/edfef691-93a9-41b5-aeb0-2ebbdf4442b6/export"/>
    <published>2023-05-18T00:36:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2d266553-2123-4d84-aa22-9226156fa398/export</id>
    <title>2d266553-2123-4d84-aa22-9226156fa398</title>
    <updated>2026-05-06T11:30:19.943669+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2d266553-2123-4d84-aa22-9226156fa398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/arpsyndicate/566", "content": "#ExploitObserverAlert\n\nCVE-2023-2774\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2774. A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T03:47:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2d266553-2123-4d84-aa22-9226156fa398/export"/>
    <published>2023-11-25T03:47:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a44aa5c6-6c68-4c72-a8c2-2c13437a15b5/export</id>
    <title>a44aa5c6-6c68-4c72-a8c2-2c13437a15b5</title>
    <updated>2026-05-06T11:30:19.943499+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a44aa5c6-6c68-4c72-a8c2-2c13437a15b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/arpsyndicate/1619", "content": "#ExploitObserverAlert\n\nCVE-2023-2774\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2774. A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T12:38:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a44aa5c6-6c68-4c72-a8c2-2c13437a15b5/export"/>
    <published>2023-12-10T12:38:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ea4fae5-d54a-4d69-8373-675e42c39f37/export</id>
    <title>9ea4fae5-d54a-4d69-8373-675e42c39f37</title>
    <updated>2026-05-06T11:30:19.941652+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ea4fae5-d54a-4d69-8373-675e42c39f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27742", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27742\n\ud83d\udd39 Description: IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login.\n\ud83d\udccf Published: 2023-05-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T17:19:30.046Z\n\ud83d\udd17 References:\n1. https://github.com/G37SYS73M/CVE-2023-27742", "creation_timestamp": "2025-01-23T18:03:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ea4fae5-d54a-4d69-8373-675e42c39f37/export"/>
    <published>2025-01-23T18:03:29+00:00</published>
  </entry>
</feed>
