<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 06:58:59 +0000</lastBuildDate>
    <item>
      <title>2219ef26-cdf6-49a1-80b5-bc49ae5dd423</title>
      <link>https://vulnerability.circl.lu/sighting/2219ef26-cdf6-49a1-80b5-bc49ae5dd423/export</link>
      <description>{"uuid": "2219ef26-cdf6-49a1-80b5-bc49ae5dd423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "seen", "source": "https://t.me/cibsecurity/73029", "content": "\u203c CVE-2023-42406 \u203c\n\nSQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-27T02:16:16.000000Z"}</description>
      <content:encoded>{"uuid": "2219ef26-cdf6-49a1-80b5-bc49ae5dd423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "seen", "source": "https://t.me/cibsecurity/73029", "content": "\u203c CVE-2023-42406 \u203c\n\nSQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-27T02:16:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2219ef26-cdf6-49a1-80b5-bc49ae5dd423/export</guid>
      <pubDate>Fri, 27 Oct 2023 02:16:16 +0000</pubDate>
    </item>
    <item>
      <title>65eec79e-8c08-4ca1-9de9-d44aa030d972</title>
      <link>https://vulnerability.circl.lu/sighting/65eec79e-8c08-4ca1-9de9-d44aa030d972/export</link>
      <description>{"uuid": "65eec79e-8c08-4ca1-9de9-d44aa030d972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "seen", "source": "Telegram/BInHsv8QLPFw0ngOrqx1Jf34o7-WDNUfgDTh8jC7E6NCfA", "content": "", "creation_timestamp": "2023-10-27T12:29:39.000000Z"}</description>
      <content:encoded>{"uuid": "65eec79e-8c08-4ca1-9de9-d44aa030d972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "seen", "source": "Telegram/BInHsv8QLPFw0ngOrqx1Jf34o7-WDNUfgDTh8jC7E6NCfA", "content": "", "creation_timestamp": "2023-10-27T12:29:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/65eec79e-8c08-4ca1-9de9-d44aa030d972/export</guid>
      <pubDate>Fri, 27 Oct 2023 12:29:39 +0000</pubDate>
    </item>
    <item>
      <title>89b663ac-510f-4399-bab8-1b6e85e83f0e</title>
      <link>https://vulnerability.circl.lu/sighting/89b663ac-510f-4399-bab8-1b6e85e83f0e/export</link>
      <description>{"uuid": "89b663ac-510f-4399-bab8-1b6e85e83f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9702", "content": "#exploit\n1. CVE-2023-26360:\nAdobe Coldfusion File Read Arbrtary Exploit\nhttps://github.com/yosef0x01/CVE-2023-26360\n\n2. CVE-2023-42406:\nSQL injection in D-Link DAR-7000\nhttps://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md\n]-&amp;gt; https://github.com/1dreamGN/CVE/blob/main/D-LINK%20-DAR-7000_sql__sysmanage_editrole.php.md\n\n3. Out-of-memory happened in TIFFOpen via a craft file\nhttps://gitlab.com/libtiff/libtiff/-/issues/614", "creation_timestamp": "2024-01-03T14:27:37.000000Z"}</description>
      <content:encoded>{"uuid": "89b663ac-510f-4399-bab8-1b6e85e83f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9702", "content": "#exploit\n1. CVE-2023-26360:\nAdobe Coldfusion File Read Arbrtary Exploit\nhttps://github.com/yosef0x01/CVE-2023-26360\n\n2. CVE-2023-42406:\nSQL injection in D-Link DAR-7000\nhttps://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md\n]-&amp;gt; https://github.com/1dreamGN/CVE/blob/main/D-LINK%20-DAR-7000_sql__sysmanage_editrole.php.md\n\n3. Out-of-memory happened in TIFFOpen via a craft file\nhttps://gitlab.com/libtiff/libtiff/-/issues/614", "creation_timestamp": "2024-01-03T14:27:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/89b663ac-510f-4399-bab8-1b6e85e83f0e/export</guid>
      <pubDate>Wed, 03 Jan 2024 14:27:37 +0000</pubDate>
    </item>
    <item>
      <title>58015d24-515c-4da3-b229-81fccae5c771</title>
      <link>https://vulnerability.circl.lu/sighting/58015d24-515c-4da3-b229-81fccae5c771/export</link>
      <description>{"uuid": "58015d24-515c-4da3-b229-81fccae5c771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2402", "content": "#exploit\n1. CVE-2023-26360:\nAdobe Coldfusion File Read Arbrtary Exploit\nhttps://github.com/yosef0x01/CVE-2023-26360\n\n2. CVE-2023-42406:\nSQL injection in D-Link DAR-7000\nhttps://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md\n]-&amp;gt; https://github.com/1dreamGN/CVE/blob/main/D-LINK%20-DAR-7000_sql__sysmanage_editrole.php.md", "creation_timestamp": "2024-08-16T08:59:54.000000Z"}</description>
      <content:encoded>{"uuid": "58015d24-515c-4da3-b229-81fccae5c771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42406", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2402", "content": "#exploit\n1. CVE-2023-26360:\nAdobe Coldfusion File Read Arbrtary Exploit\nhttps://github.com/yosef0x01/CVE-2023-26360\n\n2. CVE-2023-42406:\nSQL injection in D-Link DAR-7000\nhttps://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md\n]-&amp;gt; https://github.com/1dreamGN/CVE/blob/main/D-LINK%20-DAR-7000_sql__sysmanage_editrole.php.md", "creation_timestamp": "2024-08-16T08:59:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/58015d24-515c-4da3-b229-81fccae5c771/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:59:54 +0000</pubDate>
    </item>
  </channel>
</rss>
