{"uuid": "5d24ebcd-f739-4ecf-a1e4-672ebd58ee68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7191", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12330", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-7191\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2023-12-31T16:00:05.206Z\n\ud83d\udccf Modified: 2025-04-17T19:48:09.151Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.249393\n2. https://vuldb.com/?ctiid.249393\n3. https://note.zhaoj.in/share/Fmytf7wBINbP", "creation_timestamp": "2025-04-17T19:58:02.000000Z"}