{"vulnerability": "cve-2023-7142", "sightings": [{"uuid": "d2ea1aaf-1501-4368-92f2-f01803e1d41b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7142", "type": "seen", "source": "https://t.me/ctinow/160273", "content": "https://ift.tt/rBixGAU\nCVE-2023-7142", "creation_timestamp": "2023-12-29T01:26:50.000000Z"}, {"uuid": "37ce66ca-57b4-40f8-aa1e-cd0491a85589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7142", "type": "seen", "source": "https://t.me/arpsyndicate/2283", "content": "#ExploitObserverAlert\n\nCVE-2023-7142\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7142. A vulnerability was found in code-projects Client Details System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/clientview.php. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249145 was assigned to this vulnerability.", "creation_timestamp": "2023-12-31T03:09:55.000000Z"}, {"uuid": "d89af761-95f8-4667-b3b9-37c45408f8f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-7142", "type": "seen", "source": "https://t.me/ctinow/162246", "content": "https://ift.tt/NlIvt76\nCVE-2023-7142 Exploit", "creation_timestamp": "2024-01-03T08:16:53.000000Z"}]}