<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:39:43.381095+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad917c92-226c-4d8a-afee-fde4fc7fb0a9/export</id>
    <title>ad917c92-226c-4d8a-afee-fde4fc7fb0a9</title>
    <updated>2026-05-06T19:39:43.747070+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad917c92-226c-4d8a-afee-fde4fc7fb0a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "Telegram/E5rIyo4yL4A8Cl6ljSa_CCU0uFuGXhuvUe-Dy3r702CaxA", "content": "", "creation_timestamp": "2023-09-02T04:07:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad917c92-226c-4d8a-afee-fde4fc7fb0a9/export"/>
    <published>2023-09-02T04:07:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/739dcd8b-c86b-4926-9f83-daf84f527587/export</id>
    <title>739dcd8b-c86b-4926-9f83-daf84f527587</title>
    <updated>2026-05-06T19:39:43.746992+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "739dcd8b-c86b-4926-9f83-daf84f527587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4240", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-02T04:30:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/739dcd8b-c86b-4926-9f83-daf84f527587/export"/>
    <published>2023-09-02T04:30:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c/export</id>
    <title>5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c</title>
    <updated>2026-05-06T19:39:43.746912+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "Telegram/md5Pwtve7jVTx3xy8D8J1lcevEgfzLM_a_lPeb-uR2QiMQ", "content": "", "creation_timestamp": "2023-09-04T06:54:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c/export"/>
    <published>2023-09-04T06:54:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/616f6231-2df0-464a-a1e3-c503ec1769ba/export</id>
    <title>616f6231-2df0-464a-a1e3-c503ec1769ba</title>
    <updated>2026-05-06T19:39:43.746829+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "616f6231-2df0-464a-a1e3-c503ec1769ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4258", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-04T07:05:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/616f6231-2df0-464a-a1e3-c503ec1769ba/export"/>
    <published>2023-09-04T07:05:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fe37dadd-daff-437f-8708-2a79a0e0cd7b/export</id>
    <title>fe37dadd-daff-437f-8708-2a79a0e0cd7b</title>
    <updated>2026-05-06T19:39:43.746748+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fe37dadd-daff-437f-8708-2a79a0e0cd7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\nURL\uff1ahttps://github.com/Chocapikk/CVE-2023-30943\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-07T13:27:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fe37dadd-daff-437f-8708-2a79a0e0cd7b/export"/>
    <published>2023-09-07T13:27:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a702fdb9-356e-4d15-b1be-9807a0e49ae6/export</id>
    <title>a702fdb9-356e-4d15-b1be-9807a0e49ae6</title>
    <updated>2026-05-06T19:39:43.746664+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a702fdb9-356e-4d15-b1be-9807a0e49ae6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8993", "content": "#tools\n#Blue_Team_Techniques\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle\nhttps://github.com/Chocapikk/CVE-2023-30943", "creation_timestamp": "2023-09-09T12:36:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a702fdb9-356e-4d15-b1be-9807a0e49ae6/export"/>
    <published>2023-09-09T12:36:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fac01e13-f0fc-4b63-9e72-bf8d20d5e07d/export</id>
    <title>fac01e13-f0fc-4b63-9e72-bf8d20d5e07d</title>
    <updated>2026-05-06T19:39:43.746581+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fac01e13-f0fc-4b63-9e72-bf8d20d5e07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11545", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 A Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943", "creation_timestamp": "2023-09-10T07:20:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fac01e13-f0fc-4b63-9e72-bf8d20d5e07d/export"/>
    <published>2023-09-10T07:20:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b8a93caa-b55c-4713-ae15-c66beb5e0dd8/export</id>
    <title>b8a93caa-b55c-4713-ae15-c66beb5e0dd8</title>
    <updated>2026-05-06T19:39:43.746471+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b8a93caa-b55c-4713-ae15-c66beb5e0dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3187", "content": "Hackers Factory \n\nA fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests\n\nhttps://github.com/projectdiscovery/naabu\n\nA collection of phishing samples for researchers and detection developers.\n\nhttps://github.com/rf-peixoto/phishing_pot\n\nPassive subdomain continous monitoring tool.\n\nhttps://github.com/e1abrador/sub.Monitor\n\nSecurity scanner for your Terraform code\n\nhttps://github.com/aquasecurity/tfsec\n\nDetect and remediate misconfigurations and security risks across all your GitHub and GitLab assets\n\nhttps://github.com/Legit-Labs/legitify\n\nStreamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools.\n\nhttps://github.com/thecyberneh/scriptkiddi3\n\nUseful resources for SOC Analyst and SOC Analyst candidates.\n\nhttps://github.com/LetsDefend/awesome-soc-analyst\n\nXML-RPC Vulnerability Checker and Directory Fuzzer\n\nhttps://github.com/MINAD0/XML-RPC-Check\n\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943\n\nAn exploit for OpenTSDB &amp;lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nNotepad++ heap buffer overflow vulnerability CVE-2023-40031 analysis and reproduction\n\nhttps://github.com/webraybtl/CVE-2023-40031\n\nPMP-Decrypter. This is a tool to decrypt the encrypted password strings in \"Patch My PC\"\n\nhttps://github.com/LuemmelSec/PMP-Decrypter\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-10T12:01:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b8a93caa-b55c-4713-ae15-c66beb5e0dd8/export"/>
    <published>2023-09-10T12:01:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/83200bfb-7dc5-4463-97c2-03f54b949f63/export</id>
    <title>83200bfb-7dc5-4463-97c2-03f54b949f63</title>
    <updated>2026-05-06T19:39:43.746355+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "83200bfb-7dc5-4463-97c2-03f54b949f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1103", "content": "CVE-2023-30943: Moodle &amp;lt;= 4.2.0 - \u0627\u06cc\u062c\u0627\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u067e\u0648\u0634\u0647 (Stored-XSS) \u0628\u0647 RCE\n\u0644\u06cc\u0646\u06a9: https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/\n\nCVE-2023-30943 : Moodle &amp;lt;= 4.2.0 - Arbitrary folder creation (Stored-XSS) to RCE \nLink : https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/", "creation_timestamp": "2024-05-12T05:59:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/83200bfb-7dc5-4463-97c2-03f54b949f63/export"/>
    <published>2024-05-12T05:59:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/65316f84-1d84-4869-ade7-c7d5bcb711f8/export</id>
    <title>65316f84-1d84-4869-ade7-c7d5bcb711f8</title>
    <updated>2026-05-06T19:39:43.744982+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "65316f84-1d84-4869-ade7-c7d5bcb711f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30948", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/512", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-30948\n\ud83d\udd39 Description: A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content.\n\nThis defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time.\n\ud83d\udccf Published: 2023-06-06T14:12:59.240Z\n\ud83d\udccf Modified: 2025-01-07T18:15:43.559Z\n\ud83d\udd17 References:\n1. https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62", "creation_timestamp": "2025-01-07T18:38:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/65316f84-1d84-4869-ade7-c7d5bcb711f8/export"/>
    <published>2025-01-07T18:38:54+00:00</published>
  </entry>
</feed>
