{"vulnerability": "CVE-2023-42236", "sightings": [{"uuid": "51937b23-fbe8-4aad-81c5-40c71e4d299a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42236", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr73k4k62f", "content": "", "creation_timestamp": "2025-01-13T22:16:01.332688Z"}, {"uuid": "91bb430b-b0aa-49da-9d1e-fb95760fb701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42236", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1408", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42236\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /common/ajaxfunction.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:58:23.630450\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:08:57.000000Z"}]}