<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:29:59 +0000</lastBuildDate>
    <item>
      <title>33b08926-8816-4a83-84fb-057442cd7ffd</title>
      <link>https://vulnerability.circl.lu/sighting/33b08926-8816-4a83-84fb-057442cd7ffd/export</link>
      <description>{"uuid": "33b08926-8816-4a83-84fb-057442cd7ffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27746", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aBlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748\nURL\uff1ahttps://github.com/eyJhb/blackvue-cve-2023\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-12T19:26:45.000000Z"}</description>
      <content:encoded>{"uuid": "33b08926-8816-4a83-84fb-057442cd7ffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27746", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aBlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748\nURL\uff1ahttps://github.com/eyJhb/blackvue-cve-2023\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-12T19:26:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/33b08926-8816-4a83-84fb-057442cd7ffd/export</guid>
      <pubDate>Wed, 12 Apr 2023 19:26:45 +0000</pubDate>
    </item>
    <item>
      <title>4ea06f83-a505-4271-ac81-46cad599c1a2</title>
      <link>https://vulnerability.circl.lu/sighting/4ea06f83-a505-4271-ac81-46cad599c1a2/export</link>
      <description>{"uuid": "4ea06f83-a505-4271-ac81-46cad599c1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27748", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aBlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748\nURL\uff1ahttps://github.com/eyJhb/blackvue-cve-2023\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-12T19:26:45.000000Z"}</description>
      <content:encoded>{"uuid": "4ea06f83-a505-4271-ac81-46cad599c1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27748", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aBlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748\nURL\uff1ahttps://github.com/eyJhb/blackvue-cve-2023\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-12T19:26:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ea06f83-a505-4271-ac81-46cad599c1a2/export</guid>
      <pubDate>Wed, 12 Apr 2023 19:26:45 +0000</pubDate>
    </item>
    <item>
      <title>15292748-f59b-4e6a-8cbd-c4c60b904082</title>
      <link>https://vulnerability.circl.lu/sighting/15292748-f59b-4e6a-8cbd-c4c60b904082/export</link>
      <description>{"uuid": "15292748-f59b-4e6a-8cbd-c4c60b904082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27748", "type": "seen", "source": "https://t.me/cibsecurity/62081", "content": "\u203c CVE-2023-27748 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:13.000000Z"}</description>
      <content:encoded>{"uuid": "15292748-f59b-4e6a-8cbd-c4c60b904082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27748", "type": "seen", "source": "https://t.me/cibsecurity/62081", "content": "\u203c CVE-2023-27748 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/15292748-f59b-4e6a-8cbd-c4c60b904082/export</guid>
      <pubDate>Fri, 14 Apr 2023 00:25:13 +0000</pubDate>
    </item>
    <item>
      <title>0568793e-a77f-4f37-a1c7-cdc34c291aba</title>
      <link>https://vulnerability.circl.lu/sighting/0568793e-a77f-4f37-a1c7-cdc34c291aba/export</link>
      <description>{"uuid": "0568793e-a77f-4f37-a1c7-cdc34c291aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27747", "type": "seen", "source": "https://t.me/cibsecurity/62085", "content": "\u203c CVE-2023-27747 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:20.000000Z"}</description>
      <content:encoded>{"uuid": "0568793e-a77f-4f37-a1c7-cdc34c291aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27747", "type": "seen", "source": "https://t.me/cibsecurity/62085", "content": "\u203c CVE-2023-27747 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0568793e-a77f-4f37-a1c7-cdc34c291aba/export</guid>
      <pubDate>Fri, 14 Apr 2023 00:25:20 +0000</pubDate>
    </item>
    <item>
      <title>aac582ba-03f2-40ca-a89a-46abdd030ed0</title>
      <link>https://vulnerability.circl.lu/sighting/aac582ba-03f2-40ca-a89a-46abdd030ed0/export</link>
      <description>{"uuid": "aac582ba-03f2-40ca-a89a-46abdd030ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27746", "type": "seen", "source": "https://t.me/cibsecurity/62093", "content": "\u203c CVE-2023-27746 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T03:22:25.000000Z"}</description>
      <content:encoded>{"uuid": "aac582ba-03f2-40ca-a89a-46abdd030ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27746", "type": "seen", "source": "https://t.me/cibsecurity/62093", "content": "\u203c CVE-2023-27746 \u203c\n\nBlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T03:22:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aac582ba-03f2-40ca-a89a-46abdd030ed0/export</guid>
      <pubDate>Tue, 09 May 2023 03:22:25 +0000</pubDate>
    </item>
    <item>
      <title>728994e8-121a-4b93-9035-b39e1a674545</title>
      <link>https://vulnerability.circl.lu/sighting/728994e8-121a-4b93-9035-b39e1a674545/export</link>
      <description>{"uuid": "728994e8-121a-4b93-9035-b39e1a674545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27742", "type": "seen", "source": "https://t.me/cibsecurity/64271", "content": "\u203c CVE-2023-27742 \u203c\n\nIDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T00:32:41.000000Z"}</description>
      <content:encoded>{"uuid": "728994e8-121a-4b93-9035-b39e1a674545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27742", "type": "seen", "source": "https://t.me/cibsecurity/64271", "content": "\u203c CVE-2023-27742 \u203c\n\nIDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T00:32:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/728994e8-121a-4b93-9035-b39e1a674545/export</guid>
      <pubDate>Wed, 17 May 2023 00:32:41 +0000</pubDate>
    </item>
    <item>
      <title>edfef691-93a9-41b5-aeb0-2ebbdf4442b6</title>
      <link>https://vulnerability.circl.lu/sighting/edfef691-93a9-41b5-aeb0-2ebbdf4442b6/export</link>
      <description>{"uuid": "edfef691-93a9-41b5-aeb0-2ebbdf4442b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/cibsecurity/64350", "content": "\u203c CVE-2023-2774 \u203c\n\nA vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T00:36:32.000000Z"}</description>
      <content:encoded>{"uuid": "edfef691-93a9-41b5-aeb0-2ebbdf4442b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/cibsecurity/64350", "content": "\u203c CVE-2023-2774 \u203c\n\nA vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T00:36:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/edfef691-93a9-41b5-aeb0-2ebbdf4442b6/export</guid>
      <pubDate>Thu, 18 May 2023 00:36:32 +0000</pubDate>
    </item>
    <item>
      <title>2d266553-2123-4d84-aa22-9226156fa398</title>
      <link>https://vulnerability.circl.lu/sighting/2d266553-2123-4d84-aa22-9226156fa398/export</link>
      <description>{"uuid": "2d266553-2123-4d84-aa22-9226156fa398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/arpsyndicate/566", "content": "#ExploitObserverAlert\n\nCVE-2023-2774\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2774. A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T03:47:03.000000Z"}</description>
      <content:encoded>{"uuid": "2d266553-2123-4d84-aa22-9226156fa398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/arpsyndicate/566", "content": "#ExploitObserverAlert\n\nCVE-2023-2774\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2774. A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T03:47:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2d266553-2123-4d84-aa22-9226156fa398/export</guid>
      <pubDate>Sat, 25 Nov 2023 03:47:03 +0000</pubDate>
    </item>
    <item>
      <title>a44aa5c6-6c68-4c72-a8c2-2c13437a15b5</title>
      <link>https://vulnerability.circl.lu/sighting/a44aa5c6-6c68-4c72-a8c2-2c13437a15b5/export</link>
      <description>{"uuid": "a44aa5c6-6c68-4c72-a8c2-2c13437a15b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/arpsyndicate/1619", "content": "#ExploitObserverAlert\n\nCVE-2023-2774\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2774. A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T12:38:08.000000Z"}</description>
      <content:encoded>{"uuid": "a44aa5c6-6c68-4c72-a8c2-2c13437a15b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2774", "type": "seen", "source": "https://t.me/arpsyndicate/1619", "content": "#ExploitObserverAlert\n\nCVE-2023-2774\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2774. A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T12:38:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a44aa5c6-6c68-4c72-a8c2-2c13437a15b5/export</guid>
      <pubDate>Sun, 10 Dec 2023 12:38:08 +0000</pubDate>
    </item>
    <item>
      <title>9ea4fae5-d54a-4d69-8373-675e42c39f37</title>
      <link>https://vulnerability.circl.lu/sighting/9ea4fae5-d54a-4d69-8373-675e42c39f37/export</link>
      <description>{"uuid": "9ea4fae5-d54a-4d69-8373-675e42c39f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27742", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27742\n\ud83d\udd39 Description: IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login.\n\ud83d\udccf Published: 2023-05-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T17:19:30.046Z\n\ud83d\udd17 References:\n1. https://github.com/G37SYS73M/CVE-2023-27742", "creation_timestamp": "2025-01-23T18:03:29.000000Z"}</description>
      <content:encoded>{"uuid": "9ea4fae5-d54a-4d69-8373-675e42c39f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27742", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27742\n\ud83d\udd39 Description: IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login.\n\ud83d\udccf Published: 2023-05-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T17:19:30.046Z\n\ud83d\udd17 References:\n1. https://github.com/G37SYS73M/CVE-2023-27742", "creation_timestamp": "2025-01-23T18:03:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9ea4fae5-d54a-4d69-8373-675e42c39f37/export</guid>
      <pubDate>Thu, 23 Jan 2025 18:03:29 +0000</pubDate>
    </item>
  </channel>
</rss>
