<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:39:41 +0000</lastBuildDate>
    <item>
      <title>ad917c92-226c-4d8a-afee-fde4fc7fb0a9</title>
      <link>https://vulnerability.circl.lu/sighting/ad917c92-226c-4d8a-afee-fde4fc7fb0a9/export</link>
      <description>{"uuid": "ad917c92-226c-4d8a-afee-fde4fc7fb0a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "Telegram/E5rIyo4yL4A8Cl6ljSa_CCU0uFuGXhuvUe-Dy3r702CaxA", "content": "", "creation_timestamp": "2023-09-02T04:07:54.000000Z"}</description>
      <content:encoded>{"uuid": "ad917c92-226c-4d8a-afee-fde4fc7fb0a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "Telegram/E5rIyo4yL4A8Cl6ljSa_CCU0uFuGXhuvUe-Dy3r702CaxA", "content": "", "creation_timestamp": "2023-09-02T04:07:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ad917c92-226c-4d8a-afee-fde4fc7fb0a9/export</guid>
      <pubDate>Sat, 02 Sep 2023 04:07:54 +0000</pubDate>
    </item>
    <item>
      <title>739dcd8b-c86b-4926-9f83-daf84f527587</title>
      <link>https://vulnerability.circl.lu/sighting/739dcd8b-c86b-4926-9f83-daf84f527587/export</link>
      <description>{"uuid": "739dcd8b-c86b-4926-9f83-daf84f527587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4240", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-02T04:30:46.000000Z"}</description>
      <content:encoded>{"uuid": "739dcd8b-c86b-4926-9f83-daf84f527587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4240", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-02T04:30:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/739dcd8b-c86b-4926-9f83-daf84f527587/export</guid>
      <pubDate>Sat, 02 Sep 2023 04:30:46 +0000</pubDate>
    </item>
    <item>
      <title>5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c</title>
      <link>https://vulnerability.circl.lu/sighting/5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c/export</link>
      <description>{"uuid": "5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "Telegram/md5Pwtve7jVTx3xy8D8J1lcevEgfzLM_a_lPeb-uR2QiMQ", "content": "", "creation_timestamp": "2023-09-04T06:54:35.000000Z"}</description>
      <content:encoded>{"uuid": "5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "Telegram/md5Pwtve7jVTx3xy8D8J1lcevEgfzLM_a_lPeb-uR2QiMQ", "content": "", "creation_timestamp": "2023-09-04T06:54:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5ca50bb4-9b5d-40d0-b43a-1e6bdfed6a0c/export</guid>
      <pubDate>Mon, 04 Sep 2023 06:54:35 +0000</pubDate>
    </item>
    <item>
      <title>616f6231-2df0-464a-a1e3-c503ec1769ba</title>
      <link>https://vulnerability.circl.lu/sighting/616f6231-2df0-464a-a1e3-c503ec1769ba/export</link>
      <description>{"uuid": "616f6231-2df0-464a-a1e3-c503ec1769ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4258", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-04T07:05:29.000000Z"}</description>
      <content:encoded>{"uuid": "616f6231-2df0-464a-a1e3-c503ec1769ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4258", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-04T07:05:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/616f6231-2df0-464a-a1e3-c503ec1769ba/export</guid>
      <pubDate>Mon, 04 Sep 2023 07:05:29 +0000</pubDate>
    </item>
    <item>
      <title>fe37dadd-daff-437f-8708-2a79a0e0cd7b</title>
      <link>https://vulnerability.circl.lu/sighting/fe37dadd-daff-437f-8708-2a79a0e0cd7b/export</link>
      <description>{"uuid": "fe37dadd-daff-437f-8708-2a79a0e0cd7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\nURL\uff1ahttps://github.com/Chocapikk/CVE-2023-30943\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-07T13:27:41.000000Z"}</description>
      <content:encoded>{"uuid": "fe37dadd-daff-437f-8708-2a79a0e0cd7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\nURL\uff1ahttps://github.com/Chocapikk/CVE-2023-30943\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-07T13:27:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fe37dadd-daff-437f-8708-2a79a0e0cd7b/export</guid>
      <pubDate>Thu, 07 Sep 2023 13:27:41 +0000</pubDate>
    </item>
    <item>
      <title>a702fdb9-356e-4d15-b1be-9807a0e49ae6</title>
      <link>https://vulnerability.circl.lu/sighting/a702fdb9-356e-4d15-b1be-9807a0e49ae6/export</link>
      <description>{"uuid": "a702fdb9-356e-4d15-b1be-9807a0e49ae6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8993", "content": "#tools\n#Blue_Team_Techniques\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle\nhttps://github.com/Chocapikk/CVE-2023-30943", "creation_timestamp": "2023-09-09T12:36:01.000000Z"}</description>
      <content:encoded>{"uuid": "a702fdb9-356e-4d15-b1be-9807a0e49ae6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8993", "content": "#tools\n#Blue_Team_Techniques\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle\nhttps://github.com/Chocapikk/CVE-2023-30943", "creation_timestamp": "2023-09-09T12:36:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a702fdb9-356e-4d15-b1be-9807a0e49ae6/export</guid>
      <pubDate>Sat, 09 Sep 2023 12:36:01 +0000</pubDate>
    </item>
    <item>
      <title>fac01e13-f0fc-4b63-9e72-bf8d20d5e07d</title>
      <link>https://vulnerability.circl.lu/sighting/fac01e13-f0fc-4b63-9e72-bf8d20d5e07d/export</link>
      <description>{"uuid": "fac01e13-f0fc-4b63-9e72-bf8d20d5e07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11545", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 A Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943", "creation_timestamp": "2023-09-10T07:20:51.000000Z"}</description>
      <content:encoded>{"uuid": "fac01e13-f0fc-4b63-9e72-bf8d20d5e07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11545", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 A Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943", "creation_timestamp": "2023-09-10T07:20:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fac01e13-f0fc-4b63-9e72-bf8d20d5e07d/export</guid>
      <pubDate>Sun, 10 Sep 2023 07:20:51 +0000</pubDate>
    </item>
    <item>
      <title>b8a93caa-b55c-4713-ae15-c66beb5e0dd8</title>
      <link>https://vulnerability.circl.lu/sighting/b8a93caa-b55c-4713-ae15-c66beb5e0dd8/export</link>
      <description>{"uuid": "b8a93caa-b55c-4713-ae15-c66beb5e0dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3187", "content": "Hackers Factory \n\nA fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests\n\nhttps://github.com/projectdiscovery/naabu\n\nA collection of phishing samples for researchers and detection developers.\n\nhttps://github.com/rf-peixoto/phishing_pot\n\nPassive subdomain continous monitoring tool.\n\nhttps://github.com/e1abrador/sub.Monitor\n\nSecurity scanner for your Terraform code\n\nhttps://github.com/aquasecurity/tfsec\n\nDetect and remediate misconfigurations and security risks across all your GitHub and GitLab assets\n\nhttps://github.com/Legit-Labs/legitify\n\nStreamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools.\n\nhttps://github.com/thecyberneh/scriptkiddi3\n\nUseful resources for SOC Analyst and SOC Analyst candidates.\n\nhttps://github.com/LetsDefend/awesome-soc-analyst\n\nXML-RPC Vulnerability Checker and Directory Fuzzer\n\nhttps://github.com/MINAD0/XML-RPC-Check\n\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943\n\nAn exploit for OpenTSDB &amp;lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nNotepad++ heap buffer overflow vulnerability CVE-2023-40031 analysis and reproduction\n\nhttps://github.com/webraybtl/CVE-2023-40031\n\nPMP-Decrypter. This is a tool to decrypt the encrypted password strings in \"Patch My PC\"\n\nhttps://github.com/LuemmelSec/PMP-Decrypter\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-10T12:01:22.000000Z"}</description>
      <content:encoded>{"uuid": "b8a93caa-b55c-4713-ae15-c66beb5e0dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3187", "content": "Hackers Factory \n\nA fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests\n\nhttps://github.com/projectdiscovery/naabu\n\nA collection of phishing samples for researchers and detection developers.\n\nhttps://github.com/rf-peixoto/phishing_pot\n\nPassive subdomain continous monitoring tool.\n\nhttps://github.com/e1abrador/sub.Monitor\n\nSecurity scanner for your Terraform code\n\nhttps://github.com/aquasecurity/tfsec\n\nDetect and remediate misconfigurations and security risks across all your GitHub and GitLab assets\n\nhttps://github.com/Legit-Labs/legitify\n\nStreamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools.\n\nhttps://github.com/thecyberneh/scriptkiddi3\n\nUseful resources for SOC Analyst and SOC Analyst candidates.\n\nhttps://github.com/LetsDefend/awesome-soc-analyst\n\nXML-RPC Vulnerability Checker and Directory Fuzzer\n\nhttps://github.com/MINAD0/XML-RPC-Check\n\nA Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.\n\nhttps://github.com/Chocapikk/CVE-2023-30943\n\nAn exploit for OpenTSDB &amp;lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nNotepad++ heap buffer overflow vulnerability CVE-2023-40031 analysis and reproduction\n\nhttps://github.com/webraybtl/CVE-2023-40031\n\nPMP-Decrypter. This is a tool to decrypt the encrypted password strings in \"Patch My PC\"\n\nhttps://github.com/LuemmelSec/PMP-Decrypter\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-10T12:01:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b8a93caa-b55c-4713-ae15-c66beb5e0dd8/export</guid>
      <pubDate>Sun, 10 Sep 2023 12:01:22 +0000</pubDate>
    </item>
    <item>
      <title>83200bfb-7dc5-4463-97c2-03f54b949f63</title>
      <link>https://vulnerability.circl.lu/sighting/83200bfb-7dc5-4463-97c2-03f54b949f63/export</link>
      <description>{"uuid": "83200bfb-7dc5-4463-97c2-03f54b949f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1103", "content": "CVE-2023-30943: Moodle &amp;lt;= 4.2.0 - \u0627\u06cc\u062c\u0627\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u067e\u0648\u0634\u0647 (Stored-XSS) \u0628\u0647 RCE\n\u0644\u06cc\u0646\u06a9: https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/\n\nCVE-2023-30943 : Moodle &amp;lt;= 4.2.0 - Arbitrary folder creation (Stored-XSS) to RCE \nLink : https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/", "creation_timestamp": "2024-05-12T05:59:09.000000Z"}</description>
      <content:encoded>{"uuid": "83200bfb-7dc5-4463-97c2-03f54b949f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30943", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1103", "content": "CVE-2023-30943: Moodle &amp;lt;= 4.2.0 - \u0627\u06cc\u062c\u0627\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u067e\u0648\u0634\u0647 (Stored-XSS) \u0628\u0647 RCE\n\u0644\u06cc\u0646\u06a9: https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/\n\nCVE-2023-30943 : Moodle &amp;lt;= 4.2.0 - Arbitrary folder creation (Stored-XSS) to RCE \nLink : https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/", "creation_timestamp": "2024-05-12T05:59:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/83200bfb-7dc5-4463-97c2-03f54b949f63/export</guid>
      <pubDate>Sun, 12 May 2024 05:59:09 +0000</pubDate>
    </item>
    <item>
      <title>65316f84-1d84-4869-ade7-c7d5bcb711f8</title>
      <link>https://vulnerability.circl.lu/sighting/65316f84-1d84-4869-ade7-c7d5bcb711f8/export</link>
      <description>{"uuid": "65316f84-1d84-4869-ade7-c7d5bcb711f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30948", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/512", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-30948\n\ud83d\udd39 Description: A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content.\n\nThis defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time.\n\ud83d\udccf Published: 2023-06-06T14:12:59.240Z\n\ud83d\udccf Modified: 2025-01-07T18:15:43.559Z\n\ud83d\udd17 References:\n1. https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62", "creation_timestamp": "2025-01-07T18:38:54.000000Z"}</description>
      <content:encoded>{"uuid": "65316f84-1d84-4869-ade7-c7d5bcb711f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30948", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/512", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-30948\n\ud83d\udd39 Description: A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content.\n\nThis defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time.\n\ud83d\udccf Published: 2023-06-06T14:12:59.240Z\n\ud83d\udccf Modified: 2025-01-07T18:15:43.559Z\n\ud83d\udd17 References:\n1. https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62", "creation_timestamp": "2025-01-07T18:38:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/65316f84-1d84-4869-ade7-c7d5bcb711f8/export</guid>
      <pubDate>Tue, 07 Jan 2025 18:38:54 +0000</pubDate>
    </item>
  </channel>
</rss>
