{"vulnerability": "cve-2023-4556", "sightings": [{"uuid": "3c0974c2-6a90-495b-be24-a6ca94ad0739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45561", "type": "seen", "source": "https://t.me/ctinow/171918", "content": "https://ift.tt/0CGMzvq\nCVE-2023-45561 | A-WORLD OIRASE BEER_waiting Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-01-23T12:51:45.000000Z"}, {"uuid": "0691019b-7692-4152-902d-e91490aec035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45561", "type": "seen", "source": "https://t.me/ctinow/162051", "content": "https://ift.tt/08KYpeA\nCVE-2023-45561", "creation_timestamp": "2024-01-02T22:26:47.000000Z"}, {"uuid": "dc4eaa77-f33f-4798-84ad-18d076d87b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4556", "type": "seen", "source": "https://t.me/cibsecurity/69244", "content": "\u203c CVE-2023-4556 \u203c\n\nA vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. Affected by this issue is the function mysqli_query of the file sexit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238154 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-27T12:15:40.000000Z"}, {"uuid": "8b03ba6c-c1d4-4f6b-9c8d-ae7682d7f098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45561", "type": "seen", "source": "https://t.me/cibsecurity/74197", "content": "\u203c\ufe0fCVE-2023-45561\u203c\ufe0f\n\nAn issue in AWORLD OIRASE BEERwaiting Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:36:58.000000Z"}, {"uuid": "affdc9eb-f7bb-4648-b46a-0d3947dae60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45561", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18336", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45561\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in A-WORLD OIRASE BEER_waiting Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-13T18:59:15.668Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45561.md", "creation_timestamp": "2025-06-13T19:35:10.000000Z"}]}