<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 17:50:35 +0000</lastBuildDate>
    <item>
      <title>6ef16a75-3f2b-499d-8a2d-9e50c443f84e</title>
      <link>https://vulnerability.circl.lu/sighting/6ef16a75-3f2b-499d-8a2d-9e50c443f84e/export</link>
      <description>{"uuid": "6ef16a75-3f2b-499d-8a2d-9e50c443f84e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4712", "type": "seen", "source": "https://t.me/cibsecurity/69698", "content": "\u203c CVE-2023-4712 \u203c\n\nA vulnerability, which was classified as critical, was found in Xintian Smart Table Integrated Management System 5.6.9. This affects an unknown part of the file /SysManage/AddUpdateRole.aspx. The manipulation of the argument txtRoleName leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-02T03:19:10.000000Z"}</description>
      <content:encoded>{"uuid": "6ef16a75-3f2b-499d-8a2d-9e50c443f84e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4712", "type": "seen", "source": "https://t.me/cibsecurity/69698", "content": "\u203c CVE-2023-4712 \u203c\n\nA vulnerability, which was classified as critical, was found in Xintian Smart Table Integrated Management System 5.6.9. This affects an unknown part of the file /SysManage/AddUpdateRole.aspx. The manipulation of the argument txtRoleName leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-02T03:19:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ef16a75-3f2b-499d-8a2d-9e50c443f84e/export</guid>
      <pubDate>Sat, 02 Sep 2023 03:19:10 +0000</pubDate>
    </item>
    <item>
      <title>e3649e47-17ea-4d44-92f1-d3e318d76993</title>
      <link>https://vulnerability.circl.lu/sighting/e3649e47-17ea-4d44-92f1-d3e318d76993/export</link>
      <description>{"uuid": "e3649e47-17ea-4d44-92f1-d3e318d76993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47121", "type": "seen", "source": "https://t.me/arpsyndicate/2367", "content": "#ExploitObserverAlert\n\nCVE-2023-47121\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-47121. Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, the embedding feature is susceptible to server side request forgery. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. As a workaround, disable the Embedding feature.\n\nFIRST-EPSS: 0.000680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-03T22:13:02.000000Z"}</description>
      <content:encoded>{"uuid": "e3649e47-17ea-4d44-92f1-d3e318d76993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47121", "type": "seen", "source": "https://t.me/arpsyndicate/2367", "content": "#ExploitObserverAlert\n\nCVE-2023-47121\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-47121. Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, the embedding feature is susceptible to server side request forgery. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. As a workaround, disable the Embedding feature.\n\nFIRST-EPSS: 0.000680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-03T22:13:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e3649e47-17ea-4d44-92f1-d3e318d76993/export</guid>
      <pubDate>Wed, 03 Jan 2024 22:13:02 +0000</pubDate>
    </item>
    <item>
      <title>5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff</title>
      <link>https://vulnerability.circl.lu/sighting/5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff/export</link>
      <description>{"uuid": "5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47129", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9394", "content": "#exploit\n1. CVE-2023-47119:\nMultiple vulnerabilities in Discourse\nhttps://github.com/BaadMaro/CVE-2023-47119\n\n2. CVE-2023-47129:\nStatamic CMS &amp;lt;4.33.0 - RCE\nhttps://github.com/Cyber-Wo0dy/CVE-2023-47129\n\n3. CVE-2023-32832:\nAndroid mtk_jpeg Driver Race Condition/Privilege Escalation\nhttps://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html", "creation_timestamp": "2024-06-22T15:14:18.000000Z"}</description>
      <content:encoded>{"uuid": "5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47129", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9394", "content": "#exploit\n1. CVE-2023-47119:\nMultiple vulnerabilities in Discourse\nhttps://github.com/BaadMaro/CVE-2023-47119\n\n2. CVE-2023-47129:\nStatamic CMS &amp;lt;4.33.0 - RCE\nhttps://github.com/Cyber-Wo0dy/CVE-2023-47129\n\n3. CVE-2023-32832:\nAndroid mtk_jpeg Driver Race Condition/Privilege Escalation\nhttps://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html", "creation_timestamp": "2024-06-22T15:14:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5ab1fc0f-0b4b-47a2-871a-2ae19b46dfff/export</guid>
      <pubDate>Sat, 22 Jun 2024 15:14:18 +0000</pubDate>
    </item>
    <item>
      <title>b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a</title>
      <link>https://vulnerability.circl.lu/sighting/b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a/export</link>
      <description>{"uuid": "b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47129", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1728", "content": "#exploit\n1. CVE-2023-47119:\nMultiple vulnerabilities in Discourse\nhttps://github.com/BaadMaro/CVE-2023-47119\n\n2. CVE-2023-47129:\nStatamic CMS &amp;lt;4.33.0 - RCE\nhttps://github.com/Cyber-Wo0dy/CVE-2023-47129\n\n3. CVE-2023-32832:\nAndroid mtk_jpeg Driver Race Condition/Privilege Escalation\nhttps://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html", "creation_timestamp": "2024-08-16T08:45:55.000000Z"}</description>
      <content:encoded>{"uuid": "b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47129", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1728", "content": "#exploit\n1. CVE-2023-47119:\nMultiple vulnerabilities in Discourse\nhttps://github.com/BaadMaro/CVE-2023-47119\n\n2. CVE-2023-47129:\nStatamic CMS &amp;lt;4.33.0 - RCE\nhttps://github.com/Cyber-Wo0dy/CVE-2023-47129\n\n3. CVE-2023-32832:\nAndroid mtk_jpeg Driver Race Condition/Privilege Escalation\nhttps://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html", "creation_timestamp": "2024-08-16T08:45:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b9f4f2d1-48c5-4b63-b6a1-25e713cb5c2a/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:45:55 +0000</pubDate>
    </item>
  </channel>
</rss>
