<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 03:15:15 +0000</lastBuildDate>
    <item>
      <title>0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0</title>
      <link>https://vulnerability.circl.lu/sighting/0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0/export</link>
      <description>{"uuid": "0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6276", "type": "seen", "source": "https://t.me/arpsyndicate/642", "content": "#ExploitObserverAlert\n\nCVE-2023-6276\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6276. A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2023-11-28T13:04:13.000000Z"}</description>
      <content:encoded>{"uuid": "0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6276", "type": "seen", "source": "https://t.me/arpsyndicate/642", "content": "#ExploitObserverAlert\n\nCVE-2023-6276\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6276. A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2023-11-28T13:04:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a35faea-49f4-4bd8-8c2a-7a39c2e1e5e0/export</guid>
      <pubDate>Tue, 28 Nov 2023 13:04:13 +0000</pubDate>
    </item>
    <item>
      <title>f0b7f0dd-8ad1-481a-8c2e-f699adb3869b</title>
      <link>https://vulnerability.circl.lu/sighting/f0b7f0dd-8ad1-481a-8c2e-f699adb3869b/export</link>
      <description>{"uuid": "f0b7f0dd-8ad1-481a-8c2e-f699adb3869b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6276", "type": "seen", "source": "https://t.me/ctinow/155411", "content": "https://ift.tt/O1xNoVl\nCVE-2023-6276 | Tongda OA 2017 up to 11.9 delete.php PROJ_ID_STR sql injection", "creation_timestamp": "2023-12-16T14:47:59.000000Z"}</description>
      <content:encoded>{"uuid": "f0b7f0dd-8ad1-481a-8c2e-f699adb3869b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6276", "type": "seen", "source": "https://t.me/ctinow/155411", "content": "https://ift.tt/O1xNoVl\nCVE-2023-6276 | Tongda OA 2017 up to 11.9 delete.php PROJ_ID_STR sql injection", "creation_timestamp": "2023-12-16T14:47:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f0b7f0dd-8ad1-481a-8c2e-f699adb3869b/export</guid>
      <pubDate>Sat, 16 Dec 2023 14:47:59 +0000</pubDate>
    </item>
  </channel>
</rss>
