{"vulnerability": "cve-2023-2199", "sightings": [{"uuid": "eeb9c526-dcc6-4609-b64a-9a94b776b489", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21991", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2973", "content": "\"Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991\"\n\nhttps://qriousec.github.io/post/vbox-pwn2own-2023/\n\n#infosec #pentest #redteam", "creation_timestamp": "2023-05-12T17:49:32.000000Z"}, {"uuid": "2171c3ba-67fe-461d-86b5-b4a6d5494493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21991", "type": "published-proof-of-concept", "source": "https://t.me/cKure/12279", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991.\n\nhttps://qriousec.github.io/post/vbox-pwn2own-2023/", "creation_timestamp": "2024-02-03T06:16:21.000000Z"}, {"uuid": "2dca041c-47b0-4d67-9363-5e87a8328077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21991", "type": "published-proof-of-concept", "source": "Telegram/v4_gezVrrqBcndBhy_MPi4gv0PwGp3-UQAfkkJE1YYUwjQ", "content": "", "creation_timestamp": "2023-11-04T01:20:21.000000Z"}, {"uuid": "003bfb84-4a7c-4ea5-8a05-7b6fcc4f781c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21993", "type": "seen", "source": "https://t.me/arpsyndicate/2335", "content": "#ExploitObserverAlert\n\nCVE-2023-21993\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-21993. Vulnerability in the Oracle Clinical Remote Data Capture product of Oracle Health Sciences Applications (component: Forms).   The supported version that is affected is 5.4.0.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Clinical Remote Data Capture.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Clinical Remote Data Capture accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n\nFIRST-EPSS: 0.000470000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2024-01-03T17:54:40.000000Z"}, {"uuid": "96fe123a-9e0f-498c-a909-c0bd8667c846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21999", "type": "seen", "source": "https://t.me/cibsecurity/62390", "content": "\u203c CVE-2023-21999 \u203c\n\nVulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T00:29:31.000000Z"}, {"uuid": "0026700b-4716-4255-9be8-68c80e9c8ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21997", "type": "seen", "source": "https://t.me/cibsecurity/62385", "content": "\u203c CVE-2023-21997 \u203c\n\nVulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Proxy User Delegation). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle User Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-07T23:44:07.000000Z"}, {"uuid": "d9c0a975-3524-4b89-94b1-e3046ed465d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21991", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/8189", "content": "#exploit\n1. CVE-2023-21987, CVE-2023-21991:\nOracle VirtualBox (Core) Vulnerabilities\nhttps://qriousec.github.io/post/vbox-pwn2own-2023\n\n2. CVE-2023-1389:\nTP-Link Archer/Qrious Security - WAN-side entry\nhttps://www.zerodayinitiative.com/blog/2023/4/21/tp-link-wan-side-vulnerability-cve-2023-1389-added-to-the-mirai-botnet-arsenal", "creation_timestamp": "2023-04-26T11:03:01.000000Z"}, {"uuid": "3038817b-d80e-4259-aab1-c72763b5fcae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21991", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/5911", "content": "CVE-2023-21987 and CVE-2023-21991 - VirtualBox internals and exploitation \n\nGithub\n\n#CVE #virtualbox\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2024-01-02T09:39:53.000000Z"}]}