{"vulnerability": "CVE-2023-5105", "sightings": [{"uuid": "5117d4fa-c8c1-433a-b25f-d81c93b4fcae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51059", "type": "seen", "source": "https://t.me/arpsyndicate/2952", "content": "#ExploitObserverAlert\n\nCVE-2023-51059\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-51059. An issue in MOKO TECHNOLOGY LTD MOKOSmart MKGW1 BLE Gateway v.1.1.1 and before allows a remote attacker to escalate privileges via the session management component of the administrative web interface.\n\nFIRST-EPSS: 0.000470000", "creation_timestamp": "2024-01-19T19:18:33.000000Z"}, {"uuid": "88e860a5-014f-43db-9e17-42649fa3647b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51059", "type": "seen", "source": "https://t.me/ctinow/171528", "content": "https://ift.tt/SZT2wdW\nCVE-2023-51059 Exploit", "creation_timestamp": "2024-01-22T23:16:54.000000Z"}, {"uuid": "0fdbf457-1078-4b9c-a22f-ba05498e8baf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51059", "type": "seen", "source": "https://t.me/ctinow/168601", "content": "https://ift.tt/2KAR0de\nCVE-2023-51059", "creation_timestamp": "2024-01-16T03:26:48.000000Z"}, {"uuid": "6388b4d3-f854-4a47-82dc-33031d16567f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51052", "type": "seen", "source": "https://t.me/ctinow/157841", "content": "https://ift.tt/ysTNciS\nCVE-2023-51052", "creation_timestamp": "2023-12-21T17:21:48.000000Z"}, {"uuid": "2aa6667d-aa15-4806-8186-2631014b654d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51051", "type": "seen", "source": "https://t.me/ctinow/157840", "content": "https://ift.tt/LsHTnhQ\nCVE-2023-51051", "creation_timestamp": "2023-12-21T17:21:47.000000Z"}, {"uuid": "56e1f448-5ea3-42b0-b3f6-f607c4505bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51050", "type": "seen", "source": "https://t.me/ctinow/157839", "content": "https://ift.tt/jB9rgPi\nCVE-2023-51050", "creation_timestamp": "2023-12-21T17:21:46.000000Z"}, {"uuid": "453cc6cd-0596-4d06-ab06-8922bde0c5a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51059", "type": "seen", "source": "https://t.me/ctinow/178593", "content": "https://ift.tt/35vQfFA\nCVE-2023-51059 | Moko MOKOSmart MKGW1 BLE Gateway up to 1.1.0 Administrative Web Interface user session", "creation_timestamp": "2024-02-03T16:26:50.000000Z"}, {"uuid": "d0bb9838-39e8-48af-86b2-611d77fadb02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51051", "type": "seen", "source": "https://t.me/ctinow/168020", "content": "https://ift.tt/SuPLvhw\nCVE-2023-51051 | S-CMS 5.0 /admin/ajax.php A_textauth sql injection", "creation_timestamp": "2024-01-14T13:11:11.000000Z"}, {"uuid": "5e36e19e-53f2-414c-ae47-c09c9de9d98e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51050", "type": "seen", "source": "https://t.me/ctinow/168018", "content": "https://ift.tt/BInOtcT\nCVE-2023-51050 | S-CMS 5.0 /admin/ajax.php A_productauth sql injection", "creation_timestamp": "2024-01-14T13:11:09.000000Z"}, {"uuid": "f125b91b-ecef-4733-bc70-ee362798ee50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51052", "type": "seen", "source": "https://t.me/ctinow/168013", "content": "https://ift.tt/8qvrwJZ\nCVE-2023-51052 | S-CMS 5.0 /admin/ajax.php A_formauth sql injection", "creation_timestamp": "2024-01-14T12:46:54.000000Z"}, {"uuid": "dd965928-d836-45f1-89c4-960a306c8d6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13246", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51052\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_formauth parameter at /admin/ajax.php.\n\ud83d\udccf Published: 2023-12-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T14:54:11.681Z\n\ud83d\udd17 References:\n1. https://www.notion.so/scms5-0-sql-injection-94c791a563d1481a9439fa98a1bc9a1b", "creation_timestamp": "2025-04-24T15:06:34.000000Z"}]}