<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T08:59:27.550674+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b843e28e-de71-4243-bb00-e52d763d7910/export</id>
    <title>b843e28e-de71-4243-bb00-e52d763d7910</title>
    <updated>2026-05-06T08:59:27.890269+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b843e28e-de71-4243-bb00-e52d763d7910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30606", "type": "seen", "source": "https://t.me/cibsecurity/62425", "content": "\u203c CVE-2023-30606 \u203c\n\nDiscourse is an open source platform for community discussion. In affected versions a user logged as an administrator can call arbitrary methods on the `SiteSetting` class, notably `#clear_cache!` and `#notify_changed!`, which when done on a multisite instance, can affect the entire cluster resulting in a denial of service. Users not running in multisite environments are not affected. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T02:40:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b843e28e-de71-4243-bb00-e52d763d7910/export"/>
    <published>2023-04-19T02:40:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a100e562-f95a-425c-a0f6-9741b01b4531/export</id>
    <title>a100e562-f95a-425c-a0f6-9741b01b4531</title>
    <updated>2026-05-06T08:59:27.890194+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a100e562-f95a-425c-a0f6-9741b01b4531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30605", "type": "seen", "source": "https://t.me/cibsecurity/62444", "content": "\u203c CVE-2023-30605 \u203c\n\nArchery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. User input coming from the `variable_name` and `variable_value` parameter value in the `sql/instance.py` `param_edit` endpoint is passed to a set of methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. The affected methods are: `set_variable` in `sql/engines/goinception.py` which concatenates input which is passed to execution on the database in the `sql/engines/goinception.py`, `get_variables` in `sql/engines/goinception.py` which concatenates input which is passed to execution on the database in the `sql/engines/goinception.py`, `set_variable` in `sql/engines/mysql.py` which concatenates input which is passed to execution on the database in the `sql/engines/mysql.py` `query`, and `get_variables` in `sql/engines/mysql.py`which concatenates input which is passed to execution on the database in the `sql/engines/mysql.py` `query`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This advisory is also indexed as `GHSL-2022-104`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T07:43:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a100e562-f95a-425c-a0f6-9741b01b4531/export"/>
    <published>2023-04-19T07:43:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b6441a06-b84b-40f2-badc-75a3c46e74dd/export</id>
    <title>b6441a06-b84b-40f2-badc-75a3c46e74dd</title>
    <updated>2026-05-06T08:59:27.890122+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b6441a06-b84b-40f2-badc-75a3c46e74dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30609", "type": "seen", "source": "https://t.me/cibsecurity/62855", "content": "\u203c CVE-2023-30609 \u203c\n\nmatrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-26T00:25:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b6441a06-b84b-40f2-badc-75a3c46e74dd/export"/>
    <published>2023-04-26T00:25:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b8459d1c-dfa4-4d1e-99a9-ae4b4107b5c3/export</id>
    <title>b8459d1c-dfa4-4d1e-99a9-ae4b4107b5c3</title>
    <updated>2026-05-06T08:59:27.890046+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b8459d1c-dfa4-4d1e-99a9-ae4b4107b5c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3060", "type": "seen", "source": "https://t.me/cibsecurity/64892", "content": "\u203c CVE-2023-3060 \u203c\n\nA vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as problematic. This vulnerability affects the function doAddQuestion of the file btn_functions.php. The manipulation of the argument Question leads to cross site scripting. The attack can be initiated remotely. VDB-230566 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T18:40:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b8459d1c-dfa4-4d1e-99a9-ae4b4107b5c3/export"/>
    <published>2023-06-02T18:40:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1dfa986f-dc26-4d91-b5f3-5b494a394d0b/export</id>
    <title>1dfa986f-dc26-4d91-b5f3-5b494a394d0b</title>
    <updated>2026-05-06T08:59:27.889944+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1dfa986f-dc26-4d91-b5f3-5b494a394d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30607", "type": "seen", "source": "https://t.me/cibsecurity/66008", "content": "\u203c CVE-2023-30607 \u203c\n\nicingaweb2-module-jira provides integration with Atlassian Jira. Starting in version 1.3.0 and prior to version 1.3.2, template and field configuration forms perform the deletion action before user input is validated, including the cross site request forgery token. This issue is fixed in version 1.3.2. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-05T22:22:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1dfa986f-dc26-4d91-b5f3-5b494a394d0b/export"/>
    <published>2023-07-05T22:22:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9c5bfd1f-b005-4544-b400-600d7c1be888/export</id>
    <title>9c5bfd1f-b005-4544-b400-600d7c1be888</title>
    <updated>2026-05-06T08:59:27.887708+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9c5bfd1f-b005-4544-b400-600d7c1be888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30603", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/812", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-30603\n\ud83d\udd39 Description: Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator\u2019s privilege, resulting in performing arbitrary system operation or disrupt service.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T20:00:45.438Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html", "creation_timestamp": "2025-01-08T20:13:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9c5bfd1f-b005-4544-b400-600d7c1be888/export"/>
    <published>2025-01-08T20:13:54+00:00</published>
  </entry>
</feed>
