<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:42:42.748075+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cf703144-1087-4195-8764-b6be5d7b53c2/export</id>
    <title>cf703144-1087-4195-8764-b6be5d7b53c2</title>
    <updated>2026-05-06T18:42:43.021835+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cf703144-1087-4195-8764-b6be5d7b53c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9604", "content": "#exploit\n1. CVE-2023-50071:\nMultiple SQL injection in Customer Support System 1.0\nhttps://github.com/geraldoalcantara/CVE-2023-50071\n\n2. CVE-2023-46998:\nCross Site Scripting in Bootbox.js 3.2-6.0\nhttps://github.com/soy-oreocato/CVE-2023-46998", "creation_timestamp": "2023-12-17T12:43:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cf703144-1087-4195-8764-b6be5d7b53c2/export"/>
    <published>2023-12-17T12:43:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4dc2671d-7258-48e4-8828-6c71abb78c74/export</id>
    <title>4dc2671d-7258-48e4-8828-6c71abb78c74</title>
    <updated>2026-05-06T18:42:43.021672+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4dc2671d-7258-48e4-8828-6c71abb78c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/160719", "content": "https://ift.tt/RWK6CX9\nCVE-2023-50071", "creation_timestamp": "2023-12-29T23:26:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4dc2671d-7258-48e4-8828-6c71abb78c74/export"/>
    <published>2023-12-29T23:26:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/64ad7920-fdd4-4528-835c-a11a57a5dfc5/export</id>
    <title>64ad7920-fdd4-4528-835c-a11a57a5dfc5</title>
    <updated>2026-05-06T18:42:43.021490+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "64ad7920-fdd4-4528-835c-a11a57a5dfc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/cibsecurity/74009", "content": "\u203c\ufe0fCVE-2023-50071\u203c\ufe0f\n\nSourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in customersupportajax.php?actionsavedepartment via id or name.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/64ad7920-fdd4-4528-835c-a11a57a5dfc5/export"/>
    <published>2023-12-30T01:43:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fb078ee-d4bd-4d24-9f19-f615049a7068/export</id>
    <title>5fb078ee-d4bd-4d24-9f19-f615049a7068</title>
    <updated>2026-05-06T18:42:43.021298+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fb078ee-d4bd-4d24-9f19-f615049a7068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/arpsyndicate/2261", "content": "#ExploitObserverAlert\n\nCVE-2023-50071\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50071. Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.", "creation_timestamp": "2023-12-31T00:00:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fb078ee-d4bd-4d24-9f19-f615049a7068/export"/>
    <published>2023-12-31T00:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/82a2711f-ae71-4a7f-b022-da61ca47cc21/export</id>
    <title>82a2711f-ae71-4a7f-b022-da61ca47cc21</title>
    <updated>2026-05-06T18:42:43.021092+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "82a2711f-ae71-4a7f-b022-da61ca47cc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/163766", "content": "https://ift.tt/fAbcips\nCVE-2023-50071 Exploit", "creation_timestamp": "2024-01-05T23:16:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/82a2711f-ae71-4a7f-b022-da61ca47cc21/export"/>
    <published>2024-01-05T23:16:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6a47bdb9-0731-4655-94e1-fa011864ee61/export</id>
    <title>6a47bdb9-0731-4655-94e1-fa011864ee61</title>
    <updated>2026-05-06T18:42:43.020902+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6a47bdb9-0731-4655-94e1-fa011864ee61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/170895", "content": "https://ift.tt/0XT3GLk\nCVE-2023-50071 | SourceCodester Customer Support System 1.0 ajax.php id/name sql injection", "creation_timestamp": "2024-01-21T18:16:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6a47bdb9-0731-4655-94e1-fa011864ee61/export"/>
    <published>2024-01-21T18:16:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1eb408df-f652-4314-a7ea-a8e61afa7ca1/export</id>
    <title>1eb408df-f652-4314-a7ea-a8e61afa7ca1</title>
    <updated>2026-05-06T18:42:43.020728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1eb408df-f652-4314-a7ea-a8e61afa7ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/201457", "content": "https://ift.tt/qLZfC0m\n[webapps] CVE-2023-50071 - Multiple SQL Injection", "creation_timestamp": "2024-03-06T15:56:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1eb408df-f652-4314-a7ea-a8e61afa7ca1/export"/>
    <published>2024-03-06T15:56:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed7a02ec-6516-4c33-8bf9-941d3d270d45/export</id>
    <title>ed7a02ec-6516-4c33-8bf9-941d3d270d45</title>
    <updated>2026-05-06T18:42:43.020524+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed7a02ec-6516-4c33-8bf9-941d3d270d45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/VulnerabilityNews/35418", "content": "[webapps] CVE-2023-50071 - Multiple SQL Injection\nRead More", "creation_timestamp": "2024-03-06T16:14:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed7a02ec-6516-4c33-8bf9-941d3d270d45/export"/>
    <published>2024-03-06T16:14:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/95dabc18-12d2-4cdb-81fb-e62f89f39482/export</id>
    <title>95dabc18-12d2-4cdb-81fb-e62f89f39482</title>
    <updated>2026-05-06T18:42:43.020284+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "95dabc18-12d2-4cdb-81fb-e62f89f39482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/4144", "content": "#ExploitObserverAlert\n\nEDB-51862\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51862. CVE-2023-50071 - Multiple SQL Injection", "creation_timestamp": "2024-03-08T02:10:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/95dabc18-12d2-4cdb-81fb-e62f89f39482/export"/>
    <published>2024-03-08T02:10:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b838db6c-bdf3-4ed7-b76d-1505735e4412/export</id>
    <title>b838db6c-bdf3-4ed7-b76d-1505735e4412</title>
    <updated>2026-05-06T18:42:43.014806+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b838db6c-bdf3-4ed7-b76d-1505735e4412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2285", "content": "#exploit\n1. CVE-2023-50071:\nMultiple SQL injection in Customer Support System 1.0\nhttps://github.com/geraldoalcantara/CVE-2023-50071\n\n2. CVE-2023-46998:\nCross Site Scripting in Bootbox.js 3.2-6.0\nhttps://github.com/soy-oreocato/CVE-2023-46998", "creation_timestamp": "2024-08-16T08:57:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b838db6c-bdf3-4ed7-b76d-1505735e4412/export"/>
    <published>2024-08-16T08:57:34+00:00</published>
  </entry>
</feed>
