<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 15 May 2026 20:46:06 +0000</lastBuildDate>
    <item>
      <title>71f6d044-be05-461f-be79-3c06e46c9436</title>
      <link>https://db.gcve.eu/sighting/71f6d044-be05-461f-be79-3c06e46c9436/export</link>
      <description>{"uuid": "71f6d044-be05-461f-be79-3c06e46c9436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43743", "type": "seen", "source": "https://t.me/ctinow/161043", "content": "https://ift.tt/LjIyz6K\nCVE-2023-43743 | Zultys MX-SE/MX-SE II/MX-E/MX-Virtual/MX250/MX30 prior 16.04 Patch 16109/17.0.10 Patch 17161 Web Interface /newapi/ filter sql injection (ATREDIS-2023-0002)", "creation_timestamp": "2023-12-31T10:16:47.000000Z"}</description>
      <content:encoded>{"uuid": "71f6d044-be05-461f-be79-3c06e46c9436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43743", "type": "seen", "source": "https://t.me/ctinow/161043", "content": "https://ift.tt/LjIyz6K\nCVE-2023-43743 | Zultys MX-SE/MX-SE II/MX-E/MX-Virtual/MX250/MX30 prior 16.04 Patch 16109/17.0.10 Patch 17161 Web Interface /newapi/ filter sql injection (ATREDIS-2023-0002)", "creation_timestamp": "2023-12-31T10:16:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/71f6d044-be05-461f-be79-3c06e46c9436/export</guid>
      <pubDate>Sun, 31 Dec 2023 10:16:47 +0000</pubDate>
    </item>
    <item>
      <title>fd1506cc-47c3-4a20-963e-6fc498560f77</title>
      <link>https://db.gcve.eu/sighting/fd1506cc-47c3-4a20-963e-6fc498560f77/export</link>
      <description>{"uuid": "fd1506cc-47c3-4a20-963e-6fc498560f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43743", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43743\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an authenticated attacker to execute arbitrary SQL queries on the backend database via the filter parameter in requests to the /newapi/ endpoint in the Zultys MX web interface.\n\ud83d\udccf Published: 2023-12-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-27T15:34:49.986Z\n\ud83d\udd17 References:\n1. https://mxvirtual.com\n2. https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md", "creation_timestamp": "2025-05-27T15:49:17.000000Z"}</description>
      <content:encoded>{"uuid": "fd1506cc-47c3-4a20-963e-6fc498560f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43743", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43743\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an authenticated attacker to execute arbitrary SQL queries on the backend database via the filter parameter in requests to the /newapi/ endpoint in the Zultys MX web interface.\n\ud83d\udccf Published: 2023-12-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-27T15:34:49.986Z\n\ud83d\udd17 References:\n1. https://mxvirtual.com\n2. https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md", "creation_timestamp": "2025-05-27T15:49:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fd1506cc-47c3-4a20-963e-6fc498560f77/export</guid>
      <pubDate>Tue, 27 May 2025 15:49:17 +0000</pubDate>
    </item>
  </channel>
</rss>
