{"vulnerability": "CVE-2023-5121", "sightings": [{"uuid": "6b624630-e1f8-4fa0-90c4-e401c46a55b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51210", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17749", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51210\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL injection vulnerability in Webkul Bundle Product 6.0.1 allows a remote attacker to execute arbitrary code via the id_product parameters in the UpdateProductQuantity function.\n\ud83d\udccf Published: 2024-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-09T18:41:23.074Z\n\ud83d\udd17 References:\n1. https://medium.com/%40nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91", "creation_timestamp": "2025-06-09T19:48:11.000000Z"}, {"uuid": "7b9b7823-2c0e-4ffd-bb4a-8fdc8dd99cec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51210", "type": "seen", "source": "https://t.me/ctinow/186875", "content": "https://ift.tt/EnbhNlY\nCVE-2023-51210 | Webkul Bundle Product 6.0.1 UpdateProductQuantity id_product sql injection", "creation_timestamp": "2024-02-17T11:36:40.000000Z"}, {"uuid": "5496059c-ce62-4029-a225-b065857e0533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51219", "type": "seen", "source": "Telegram/nXfHKM7ZFxox1e6rxwGsya7LnlkDBQ3uSB8hfXcHySmwmckN", "content": "", "creation_timestamp": "2025-02-20T01:27:44.000000Z"}, {"uuid": "beec7c24-b19e-42c2-a590-3327269293b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51217", "type": "seen", "source": "https://t.me/ctinow/183123", "content": "https://ift.tt/X1uesxr\nCVE-2023-51217 | TenghuTOS TWS-200 4.0-201809201424 Ping Page os command injection", "creation_timestamp": "2024-02-12T14:41:48.000000Z"}, {"uuid": "d463c17d-9845-4e33-9d56-ed75382f73f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51210", "type": "seen", "source": "https://t.me/ctinow/176134", "content": "https://ift.tt/YFUrxBe\nCVE-2023-51210 Exploit", "creation_timestamp": "2024-01-30T18:16:56.000000Z"}, {"uuid": "003ca501-e8fa-420e-b899-82d2e9c9f55a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51217", "type": "seen", "source": "https://t.me/ctinow/174340", "content": "https://ift.tt/8uM5a1C\nCVE-2023-51217 Exploit", "creation_timestamp": "2024-01-26T17:16:39.000000Z"}, {"uuid": "cd682135-866a-440c-a1b7-2f1bb6f3e6c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51217", "type": "seen", "source": "https://t.me/ctinow/169965", "content": "https://ift.tt/MxEkFdt\nCVE-2023-51217", "creation_timestamp": "2024-01-18T22:21:31.000000Z"}, {"uuid": "85e0124c-4b25-4586-8e00-92c60fb2aafa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51210", "type": "seen", "source": "https://t.me/ctinow/172276", "content": "https://ift.tt/sqQ1ygk\nCVE-2023-51210", "creation_timestamp": "2024-01-23T20:27:02.000000Z"}]}