<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T16:06:09.090048+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/132654da-b2de-4a15-b56b-d7981c8e7394/export</id>
    <title>132654da-b2de-4a15-b56b-d7981c8e7394</title>
    <updated>2026-05-05T16:06:09.476770+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "132654da-b2de-4a15-b56b-d7981c8e7394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47460", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9370", "content": "#exploit\n1. CVE-2023-32031:\nMS Exchange PowerShell backend RCE\nhttps://github.com/Avento/CVE-2023-32031\n\n2. CVE-2021-43609:\nThe full exploit chain is SQLi -&amp;gt; file read -&amp;gt; RCE\nhttps://github.com/d5sec/CVE-2021-43609-POC\n\n3. CVE-2023-47460:\nSQL injection in Knovos Discovery v.22.67\nhttps://github.com/aleksey-vi/CVE-2023-47460", "creation_timestamp": "2023-11-11T20:38:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/132654da-b2de-4a15-b56b-d7981c8e7394/export"/>
    <published>2023-11-11T20:38:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2adf19b7-f115-469c-8b54-b3f3c57a18b4/export</id>
    <title>2adf19b7-f115-469c-8b54-b3f3c57a18b4</title>
    <updated>2026-05-05T16:06:09.476636+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2adf19b7-f115-469c-8b54-b3f3c57a18b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47460", "type": "seen", "source": "https://t.me/ctinow/168590", "content": "https://ift.tt/xFu7Xc5\nCVE-2023-47460", "creation_timestamp": "2024-01-16T02:26:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2adf19b7-f115-469c-8b54-b3f3c57a18b4/export"/>
    <published>2024-01-16T02:26:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5d94e1e7-77bd-4737-9849-58ccf9ba5d91/export</id>
    <title>5d94e1e7-77bd-4737-9849-58ccf9ba5d91</title>
    <updated>2026-05-05T16:06:09.476462+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5d94e1e7-77bd-4737-9849-58ccf9ba5d91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47460", "type": "seen", "source": "https://t.me/ctinow/171514", "content": "https://ift.tt/fy5Y1vl\nCVE-2023-47460 Exploit", "creation_timestamp": "2024-01-22T23:16:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5d94e1e7-77bd-4737-9849-58ccf9ba5d91/export"/>
    <published>2024-01-22T23:16:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3d4382f0-b22d-4116-9a29-dc223f36a850/export</id>
    <title>3d4382f0-b22d-4116-9a29-dc223f36a850</title>
    <updated>2026-05-05T16:06:09.474531+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3d4382f0-b22d-4116-9a29-dc223f36a850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47460", "type": "seen", "source": "https://t.me/ctinow/178585", "content": "https://ift.tt/pUGqjkw\nCVE-2023-47460 | Knovos Discovery 22.67.0 getGridColumnStructure sql injection", "creation_timestamp": "2024-02-03T15:21:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3d4382f0-b22d-4116-9a29-dc223f36a850/export"/>
    <published>2024-02-03T15:21:20+00:00</published>
  </entry>
</feed>
