<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:48:23.026230+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0/export</id>
    <title>0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0</title>
    <updated>2026-05-04T14:48:23.340192+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6276", "type": "seen", "source": "https://t.me/arpsyndicate/642", "content": "#ExploitObserverAlert\n\nCVE-2023-6276\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6276. A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2023-11-28T13:04:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0/export"/>
    <published>2023-11-28T13:04:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f0b7f0dd-8ad1-481a-8c2e-f699adb3869b/export</id>
    <title>f0b7f0dd-8ad1-481a-8c2e-f699adb3869b</title>
    <updated>2026-05-04T14:48:23.337939+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f0b7f0dd-8ad1-481a-8c2e-f699adb3869b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6276", "type": "seen", "source": "https://t.me/ctinow/155411", "content": "https://ift.tt/O1xNoVl\nCVE-2023-6276 | Tongda OA 2017 up to 11.9 delete.php PROJ_ID_STR sql injection", "creation_timestamp": "2023-12-16T14:47:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f0b7f0dd-8ad1-481a-8c2e-f699adb3869b/export"/>
    <published>2023-12-16T14:47:59+00:00</published>
  </entry>
</feed>
