<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:42:42 +0000</lastBuildDate>
    <item>
      <title>cf703144-1087-4195-8764-b6be5d7b53c2</title>
      <link>https://vulnerability.circl.lu/sighting/cf703144-1087-4195-8764-b6be5d7b53c2/export</link>
      <description>{"uuid": "cf703144-1087-4195-8764-b6be5d7b53c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9604", "content": "#exploit\n1. CVE-2023-50071:\nMultiple SQL injection in Customer Support System 1.0\nhttps://github.com/geraldoalcantara/CVE-2023-50071\n\n2. CVE-2023-46998:\nCross Site Scripting in Bootbox.js 3.2-6.0\nhttps://github.com/soy-oreocato/CVE-2023-46998", "creation_timestamp": "2023-12-17T12:43:01.000000Z"}</description>
      <content:encoded>{"uuid": "cf703144-1087-4195-8764-b6be5d7b53c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9604", "content": "#exploit\n1. CVE-2023-50071:\nMultiple SQL injection in Customer Support System 1.0\nhttps://github.com/geraldoalcantara/CVE-2023-50071\n\n2. CVE-2023-46998:\nCross Site Scripting in Bootbox.js 3.2-6.0\nhttps://github.com/soy-oreocato/CVE-2023-46998", "creation_timestamp": "2023-12-17T12:43:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cf703144-1087-4195-8764-b6be5d7b53c2/export</guid>
      <pubDate>Sun, 17 Dec 2023 12:43:01 +0000</pubDate>
    </item>
    <item>
      <title>4dc2671d-7258-48e4-8828-6c71abb78c74</title>
      <link>https://vulnerability.circl.lu/sighting/4dc2671d-7258-48e4-8828-6c71abb78c74/export</link>
      <description>{"uuid": "4dc2671d-7258-48e4-8828-6c71abb78c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/160719", "content": "https://ift.tt/RWK6CX9\nCVE-2023-50071", "creation_timestamp": "2023-12-29T23:26:27.000000Z"}</description>
      <content:encoded>{"uuid": "4dc2671d-7258-48e4-8828-6c71abb78c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/160719", "content": "https://ift.tt/RWK6CX9\nCVE-2023-50071", "creation_timestamp": "2023-12-29T23:26:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4dc2671d-7258-48e4-8828-6c71abb78c74/export</guid>
      <pubDate>Fri, 29 Dec 2023 23:26:27 +0000</pubDate>
    </item>
    <item>
      <title>64ad7920-fdd4-4528-835c-a11a57a5dfc5</title>
      <link>https://vulnerability.circl.lu/sighting/64ad7920-fdd4-4528-835c-a11a57a5dfc5/export</link>
      <description>{"uuid": "64ad7920-fdd4-4528-835c-a11a57a5dfc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/cibsecurity/74009", "content": "\u203c\ufe0fCVE-2023-50071\u203c\ufe0f\n\nSourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in customersupportajax.php?actionsavedepartment via id or name.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:37.000000Z"}</description>
      <content:encoded>{"uuid": "64ad7920-fdd4-4528-835c-a11a57a5dfc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/cibsecurity/74009", "content": "\u203c\ufe0fCVE-2023-50071\u203c\ufe0f\n\nSourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in customersupportajax.php?actionsavedepartment via id or name.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/64ad7920-fdd4-4528-835c-a11a57a5dfc5/export</guid>
      <pubDate>Sat, 30 Dec 2023 01:43:37 +0000</pubDate>
    </item>
    <item>
      <title>5fb078ee-d4bd-4d24-9f19-f615049a7068</title>
      <link>https://vulnerability.circl.lu/sighting/5fb078ee-d4bd-4d24-9f19-f615049a7068/export</link>
      <description>{"uuid": "5fb078ee-d4bd-4d24-9f19-f615049a7068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/arpsyndicate/2261", "content": "#ExploitObserverAlert\n\nCVE-2023-50071\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50071. Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.", "creation_timestamp": "2023-12-31T00:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "5fb078ee-d4bd-4d24-9f19-f615049a7068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/arpsyndicate/2261", "content": "#ExploitObserverAlert\n\nCVE-2023-50071\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50071. Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.", "creation_timestamp": "2023-12-31T00:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5fb078ee-d4bd-4d24-9f19-f615049a7068/export</guid>
      <pubDate>Sun, 31 Dec 2023 00:00:04 +0000</pubDate>
    </item>
    <item>
      <title>82a2711f-ae71-4a7f-b022-da61ca47cc21</title>
      <link>https://vulnerability.circl.lu/sighting/82a2711f-ae71-4a7f-b022-da61ca47cc21/export</link>
      <description>{"uuid": "82a2711f-ae71-4a7f-b022-da61ca47cc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/163766", "content": "https://ift.tt/fAbcips\nCVE-2023-50071 Exploit", "creation_timestamp": "2024-01-05T23:16:24.000000Z"}</description>
      <content:encoded>{"uuid": "82a2711f-ae71-4a7f-b022-da61ca47cc21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/163766", "content": "https://ift.tt/fAbcips\nCVE-2023-50071 Exploit", "creation_timestamp": "2024-01-05T23:16:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/82a2711f-ae71-4a7f-b022-da61ca47cc21/export</guid>
      <pubDate>Fri, 05 Jan 2024 23:16:24 +0000</pubDate>
    </item>
    <item>
      <title>6a47bdb9-0731-4655-94e1-fa011864ee61</title>
      <link>https://vulnerability.circl.lu/sighting/6a47bdb9-0731-4655-94e1-fa011864ee61/export</link>
      <description>{"uuid": "6a47bdb9-0731-4655-94e1-fa011864ee61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/170895", "content": "https://ift.tt/0XT3GLk\nCVE-2023-50071 | SourceCodester Customer Support System 1.0 ajax.php id/name sql injection", "creation_timestamp": "2024-01-21T18:16:31.000000Z"}</description>
      <content:encoded>{"uuid": "6a47bdb9-0731-4655-94e1-fa011864ee61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/170895", "content": "https://ift.tt/0XT3GLk\nCVE-2023-50071 | SourceCodester Customer Support System 1.0 ajax.php id/name sql injection", "creation_timestamp": "2024-01-21T18:16:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6a47bdb9-0731-4655-94e1-fa011864ee61/export</guid>
      <pubDate>Sun, 21 Jan 2024 18:16:31 +0000</pubDate>
    </item>
    <item>
      <title>1eb408df-f652-4314-a7ea-a8e61afa7ca1</title>
      <link>https://vulnerability.circl.lu/sighting/1eb408df-f652-4314-a7ea-a8e61afa7ca1/export</link>
      <description>{"uuid": "1eb408df-f652-4314-a7ea-a8e61afa7ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/201457", "content": "https://ift.tt/qLZfC0m\n[webapps] CVE-2023-50071 - Multiple SQL Injection", "creation_timestamp": "2024-03-06T15:56:30.000000Z"}</description>
      <content:encoded>{"uuid": "1eb408df-f652-4314-a7ea-a8e61afa7ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/ctinow/201457", "content": "https://ift.tt/qLZfC0m\n[webapps] CVE-2023-50071 - Multiple SQL Injection", "creation_timestamp": "2024-03-06T15:56:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1eb408df-f652-4314-a7ea-a8e61afa7ca1/export</guid>
      <pubDate>Wed, 06 Mar 2024 15:56:30 +0000</pubDate>
    </item>
    <item>
      <title>ed7a02ec-6516-4c33-8bf9-941d3d270d45</title>
      <link>https://vulnerability.circl.lu/sighting/ed7a02ec-6516-4c33-8bf9-941d3d270d45/export</link>
      <description>{"uuid": "ed7a02ec-6516-4c33-8bf9-941d3d270d45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/VulnerabilityNews/35418", "content": "[webapps] CVE-2023-50071 - Multiple SQL Injection\nRead More", "creation_timestamp": "2024-03-06T16:14:34.000000Z"}</description>
      <content:encoded>{"uuid": "ed7a02ec-6516-4c33-8bf9-941d3d270d45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "seen", "source": "https://t.me/VulnerabilityNews/35418", "content": "[webapps] CVE-2023-50071 - Multiple SQL Injection\nRead More", "creation_timestamp": "2024-03-06T16:14:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed7a02ec-6516-4c33-8bf9-941d3d270d45/export</guid>
      <pubDate>Wed, 06 Mar 2024 16:14:34 +0000</pubDate>
    </item>
    <item>
      <title>95dabc18-12d2-4cdb-81fb-e62f89f39482</title>
      <link>https://vulnerability.circl.lu/sighting/95dabc18-12d2-4cdb-81fb-e62f89f39482/export</link>
      <description>{"uuid": "95dabc18-12d2-4cdb-81fb-e62f89f39482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/4144", "content": "#ExploitObserverAlert\n\nEDB-51862\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51862. CVE-2023-50071 - Multiple SQL Injection", "creation_timestamp": "2024-03-08T02:10:31.000000Z"}</description>
      <content:encoded>{"uuid": "95dabc18-12d2-4cdb-81fb-e62f89f39482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/4144", "content": "#ExploitObserverAlert\n\nEDB-51862\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51862. CVE-2023-50071 - Multiple SQL Injection", "creation_timestamp": "2024-03-08T02:10:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95dabc18-12d2-4cdb-81fb-e62f89f39482/export</guid>
      <pubDate>Fri, 08 Mar 2024 02:10:31 +0000</pubDate>
    </item>
    <item>
      <title>b838db6c-bdf3-4ed7-b76d-1505735e4412</title>
      <link>https://vulnerability.circl.lu/sighting/b838db6c-bdf3-4ed7-b76d-1505735e4412/export</link>
      <description>{"uuid": "b838db6c-bdf3-4ed7-b76d-1505735e4412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2285", "content": "#exploit\n1. CVE-2023-50071:\nMultiple SQL injection in Customer Support System 1.0\nhttps://github.com/geraldoalcantara/CVE-2023-50071\n\n2. CVE-2023-46998:\nCross Site Scripting in Bootbox.js 3.2-6.0\nhttps://github.com/soy-oreocato/CVE-2023-46998", "creation_timestamp": "2024-08-16T08:57:34.000000Z"}</description>
      <content:encoded>{"uuid": "b838db6c-bdf3-4ed7-b76d-1505735e4412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50071", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2285", "content": "#exploit\n1. CVE-2023-50071:\nMultiple SQL injection in Customer Support System 1.0\nhttps://github.com/geraldoalcantara/CVE-2023-50071\n\n2. CVE-2023-46998:\nCross Site Scripting in Bootbox.js 3.2-6.0\nhttps://github.com/soy-oreocato/CVE-2023-46998", "creation_timestamp": "2024-08-16T08:57:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b838db6c-bdf3-4ed7-b76d-1505735e4412/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:57:34 +0000</pubDate>
    </item>
  </channel>
</rss>
