<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:59:30.917213+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6ef16a75-3f2b-499d-8a2d-9e50c443f84e/export</id>
    <title>6ef16a75-3f2b-499d-8a2d-9e50c443f84e</title>
    <updated>2026-05-06T09:59:31.352471+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6ef16a75-3f2b-499d-8a2d-9e50c443f84e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4712", "type": "seen", "source": "https://t.me/cibsecurity/69698", "content": "\u203c CVE-2023-4712 \u203c\n\nA vulnerability, which was classified as critical, was found in Xintian Smart Table Integrated Management System 5.6.9. This affects an unknown part of the file /SysManage/AddUpdateRole.aspx. The manipulation of the argument txtRoleName leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-02T03:19:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6ef16a75-3f2b-499d-8a2d-9e50c443f84e/export"/>
    <published>2023-09-02T03:19:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e3649e47-17ea-4d44-92f1-d3e318d76993/export</id>
    <title>e3649e47-17ea-4d44-92f1-d3e318d76993</title>
    <updated>2026-05-06T09:59:31.352388+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e3649e47-17ea-4d44-92f1-d3e318d76993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47121", "type": "seen", "source": "https://t.me/arpsyndicate/2367", "content": "#ExploitObserverAlert\n\nCVE-2023-47121\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-47121. Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, the embedding feature is susceptible to server side request forgery. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. As a workaround, disable the Embedding feature.\n\nFIRST-EPSS: 0.000680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-03T22:13:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e3649e47-17ea-4d44-92f1-d3e318d76993/export"/>
    <published>2024-01-03T22:13:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff/export</id>
    <title>5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff</title>
    <updated>2026-05-06T09:59:31.352274+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47129", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9394", "content": "#exploit\n1. CVE-2023-47119:\nMultiple vulnerabilities in Discourse\nhttps://github.com/BaadMaro/CVE-2023-47119\n\n2. CVE-2023-47129:\nStatamic CMS &amp;lt;4.33.0 - RCE\nhttps://github.com/Cyber-Wo0dy/CVE-2023-47129\n\n3. CVE-2023-32832:\nAndroid mtk_jpeg Driver Race Condition/Privilege Escalation\nhttps://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html", "creation_timestamp": "2024-06-22T15:14:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff/export"/>
    <published>2024-06-22T15:14:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a/export</id>
    <title>b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a</title>
    <updated>2026-05-06T09:59:31.349441+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47129", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1728", "content": "#exploit\n1. CVE-2023-47119:\nMultiple vulnerabilities in Discourse\nhttps://github.com/BaadMaro/CVE-2023-47119\n\n2. CVE-2023-47129:\nStatamic CMS &amp;lt;4.33.0 - RCE\nhttps://github.com/Cyber-Wo0dy/CVE-2023-47129\n\n3. CVE-2023-32832:\nAndroid mtk_jpeg Driver Race Condition/Privilege Escalation\nhttps://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html", "creation_timestamp": "2024-08-16T08:45:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a/export"/>
    <published>2024-08-16T08:45:55+00:00</published>
  </entry>
</feed>
