<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T06:23:29.307890+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6238a752-bb91-44c4-b996-a6e1c25d833a/export</id>
    <title>6238a752-bb91-44c4-b996-a6e1c25d833a</title>
    <updated>2026-05-06T06:23:29.662915+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6238a752-bb91-44c4-b996-a6e1c25d833a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49006", "type": "seen", "source": "https://t.me/ctinow/161934", "content": "https://ift.tt/lBM5ybh\nCVE-2023-49006 Exploit", "creation_timestamp": "2024-01-02T18:16:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6238a752-bb91-44c4-b996-a6e1c25d833a/export"/>
    <published>2024-01-02T18:16:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e9153bc6-2d43-4778-8a76-537d1f7557c4/export</id>
    <title>e9153bc6-2d43-4778-8a76-537d1f7557c4</title>
    <updated>2026-05-06T06:23:29.662466+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e9153bc6-2d43-4778-8a76-537d1f7557c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49006", "type": "seen", "source": "https://t.me/kasraone_com/633", "content": "\ud83d\udd34 CVE-2023-49006\n\n\n\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc Cross Site Request Forgery (CSRF) \u062f\u0631 Phpsysinfo \u0646\u0633\u062e\u0647 3.4.3 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u06cc\u06a9 \u0635\u0641\u062d\u0647 \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0634\u062f\u0647 \u062f\u0631 \u0641\u0627\u06cc\u0644 XML.php \u0628\u0647 \u062f\u0633\u062a \u0622\u0648\u0631\u062f.\n\nphpsysinfo v3.4.3\n\u062f\u0627\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc JSONP \u0627\u0633\u062a. \u0641\u0627\u06cc\u0644 XML.php \u062f\u0627\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc JSONP hijacking \u0627\u0633\u062a. \u0647\u0646\u06af\u0627\u0645\u06cc \u06a9\u0647 \u06a9\u0627\u0631\u0628\u0631 \u0627\u0632 \u0635\u0641\u062d\u0647 \u0627\u06cc \u0628\u0627\u0632\u062f\u06cc\u062f \u0645\u06cc \u06a9\u0646\u062f \u06a9\u0647 \u0628\u0627 \u062f\u0642\u062a \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645 \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u060c \u062f\u0627\u062f\u0647 \u0647\u0627\u06cc JSON \u0628\u0647 \u062f\u0633\u062a \u0645\u06cc \u0622\u06cc\u062f \u0648 \u0628\u0631\u0627\u06cc \u0645\u0647\u0627\u062c\u0645 \u0627\u0631\u0633\u0627\u0644 \u0645\u06cc \u0634\u0648\u062f.\n\u062d\u0627\u0644\u0627 \u0641\u0631\u0622\u06cc\u0646\u062f\u0647 \u0627\u06cc\u0646 \u062d\u0645\u0644\u0647 \u0686\u0637\u0648\u0631\u06cc \u0627\u0633\u062a \u061f\n\u0628\u0647 \u0633\u0627\u062f\u06af\u06cc \u0627\u0632 \u06cc\u06a9 \u0641\u0627\u06cc\u0644 PHP \u0628\u0631\u0627\u06cc \u0627\u0631\u0633\u0627\u0644 \u062f\u0627\u062f\u0647 \u0647\u0627\u06cc JSON \u0628\u0627\u0632\u06cc\u0627\u0628\u06cc \u0634\u062f\u0647 \u0628\u0647 \u0633\u0631\u0648\u0631 \u062e\u0648\u062f \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 XMLHttpRequest \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u062f.\n\n\u062f\u0631 \u0627\u06cc\u0646\u062c\u0627 \u06a9\u062f HTML \u0628\u0631\u0627\u06cc \u0627\u062b\u0628\u0627\u062a \u0641\u0627\u06cc\u0644 \u0645\u0641\u0647\u0648\u0645\u06cc \u0622\u0645\u062f\u0647 \u0627\u0633\u062a:\n\n \n \n \n \n \n \n \n \n \nfunction dezsbrxdio(data){ alert(JSON.stringify(data)); } \n \n\n \n\n\n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-01-04T10:30:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e9153bc6-2d43-4778-8a76-537d1f7557c4/export"/>
    <published>2024-01-04T10:30:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1d35385c-f152-4b84-b058-f24053fd5722/export</id>
    <title>1d35385c-f152-4b84-b058-f24053fd5722</title>
    <updated>2026-05-06T06:23:29.658296+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1d35385c-f152-4b84-b058-f24053fd5722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49006", "type": "seen", "source": "https://t.me/ctinow/167305", "content": "https://ift.tt/kS9mpcz\nCVE-2023-49006 | Phpsysinfo 3.4.3 XML.php cross-site request forgery", "creation_timestamp": "2024-01-12T15:11:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1d35385c-f152-4b84-b058-f24053fd5722/export"/>
    <published>2024-01-12T15:11:37+00:00</published>
  </entry>
</feed>
