<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 15:05:29 +0000</lastBuildDate>
    <item>
      <title>7a72c6d9-bc5b-4e0f-8a36-427a16989b26</title>
      <link>https://vulnerability.circl.lu/sighting/7a72c6d9-bc5b-4e0f-8a36-427a16989b26/export</link>
      <description>{"uuid": "7a72c6d9-bc5b-4e0f-8a36-427a16989b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "seen", "source": "https://t.me/ctinow/161144", "content": "https://ift.tt/qzXKtJ3\nCVE-2023-7191", "creation_timestamp": "2023-12-31T17:26:54.000000Z"}</description>
      <content:encoded>{"uuid": "7a72c6d9-bc5b-4e0f-8a36-427a16989b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "seen", "source": "https://t.me/ctinow/161144", "content": "https://ift.tt/qzXKtJ3\nCVE-2023-7191", "creation_timestamp": "2023-12-31T17:26:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7a72c6d9-bc5b-4e0f-8a36-427a16989b26/export</guid>
      <pubDate>Sun, 31 Dec 2023 17:26:54 +0000</pubDate>
    </item>
    <item>
      <title>a8386d7e-0a9e-4f1b-ad93-7f6a3a64c1c2</title>
      <link>https://vulnerability.circl.lu/sighting/a8386d7e-0a9e-4f1b-ad93-7f6a3a64c1c2/export</link>
      <description>{"uuid": "a8386d7e-0a9e-4f1b-ad93-7f6a3a64c1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "seen", "source": "https://t.me/cibsecurity/74073", "content": "\u203c\ufe0fCVE-2023-7191\u203c\ufe0f\n\nA vulnerability, which was classified as critical, was found in SCMS up to 2.0build2022052920231006. This affects an unknown part of the file memberreg.php. The manipulation of the argument MloginMemail leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB249393 was assigned to this vulnerability. NOTE The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:32:28.000000Z"}</description>
      <content:encoded>{"uuid": "a8386d7e-0a9e-4f1b-ad93-7f6a3a64c1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "seen", "source": "https://t.me/cibsecurity/74073", "content": "\u203c\ufe0fCVE-2023-7191\u203c\ufe0f\n\nA vulnerability, which was classified as critical, was found in SCMS up to 2.0build2022052920231006. This affects an unknown part of the file memberreg.php. The manipulation of the argument MloginMemail leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB249393 was assigned to this vulnerability. NOTE The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-01T01:32:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a8386d7e-0a9e-4f1b-ad93-7f6a3a64c1c2/export</guid>
      <pubDate>Mon, 01 Jan 2024 01:32:28 +0000</pubDate>
    </item>
    <item>
      <title>e543dccb-536d-4ffc-ac08-0dca24aaf63d</title>
      <link>https://vulnerability.circl.lu/sighting/e543dccb-536d-4ffc-ac08-0dca24aaf63d/export</link>
      <description>{"uuid": "e543dccb-536d-4ffc-ac08-0dca24aaf63d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "seen", "source": "https://t.me/ctinow/171038", "content": "https://ift.tt/aicklFL\nCVE-2023-7191 | S-CMS up to 2.0_build20220529-20231006 member/reg.php M_login/M_email sql injection", "creation_timestamp": "2024-01-22T09:11:14.000000Z"}</description>
      <content:encoded>{"uuid": "e543dccb-536d-4ffc-ac08-0dca24aaf63d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "seen", "source": "https://t.me/ctinow/171038", "content": "https://ift.tt/aicklFL\nCVE-2023-7191 | S-CMS up to 2.0_build20220529-20231006 member/reg.php M_login/M_email sql injection", "creation_timestamp": "2024-01-22T09:11:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e543dccb-536d-4ffc-ac08-0dca24aaf63d/export</guid>
      <pubDate>Mon, 22 Jan 2024 09:11:14 +0000</pubDate>
    </item>
    <item>
      <title>5d24ebcd-f739-4ecf-a1e4-672ebd58ee68</title>
      <link>https://vulnerability.circl.lu/sighting/5d24ebcd-f739-4ecf-a1e4-672ebd58ee68/export</link>
      <description>{"uuid": "5d24ebcd-f739-4ecf-a1e4-672ebd58ee68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12330", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-7191\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2023-12-31T16:00:05.206Z\n\ud83d\udccf Modified: 2025-04-17T19:48:09.151Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.249393\n2. https://vuldb.com/?ctiid.249393\n3. https://note.zhaoj.in/share/Fmytf7wBINbP", "creation_timestamp": "2025-04-17T19:58:02.000000Z"}</description>
      <content:encoded>{"uuid": "5d24ebcd-f739-4ecf-a1e4-672ebd58ee68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7191", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12330", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-7191\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2023-12-31T16:00:05.206Z\n\ud83d\udccf Modified: 2025-04-17T19:48:09.151Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.249393\n2. https://vuldb.com/?ctiid.249393\n3. https://note.zhaoj.in/share/Fmytf7wBINbP", "creation_timestamp": "2025-04-17T19:58:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5d24ebcd-f739-4ecf-a1e4-672ebd58ee68/export</guid>
      <pubDate>Thu, 17 Apr 2025 19:58:02 +0000</pubDate>
    </item>
  </channel>
</rss>
