{"vulnerability": "cve-2023-7140", "sightings": [{"uuid": "3cbf742f-a0a2-4641-8e7a-1bf03adc193e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7140", "type": "seen", "source": "https://t.me/arpsyndicate/2286", "content": "#ExploitObserverAlert\n\nCVE-2023-7140\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7140. A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143.", "creation_timestamp": "2023-12-31T03:34:48.000000Z"}, {"uuid": "225575fa-3afd-4169-9958-06691bcb40da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7140", "type": "seen", "source": "https://t.me/ctinow/170565", "content": "https://ift.tt/wkJQxTz\nCVE-2023-7140 | code-projects Client Details System 1.0 /admin/manage-users.php id sql injection", "creation_timestamp": "2024-01-20T09:16:38.000000Z"}, {"uuid": "6f838d8d-ac3b-4bf2-af25-6138c1483442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7140", "type": "seen", "source": "https://t.me/ctinow/162248", "content": "https://ift.tt/BMwQVSU\nCVE-2023-7140 Exploit", "creation_timestamp": "2024-01-03T08:16:56.000000Z"}, {"uuid": "1494300d-73a0-4451-bd58-40dc02e3ac3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7140", "type": "seen", "source": "https://t.me/ctinow/160257", "content": "https://ift.tt/3PhFz8v\nCVE-2023-7140", "creation_timestamp": "2023-12-29T00:26:19.000000Z"}]}