{"vulnerability": "cve-2023-2992", "sightings": [{"uuid": "8551f925-61b4-4486-b482-17bdcd016520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29922", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4403", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-29922 Batch detection script\nURL\uff1ahttps://github.com/1820112015/CVE-2023-29923\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-23T06:48:37.000000Z"}, {"uuid": "92d23cef-89ee-49c9-a765-96990e45432f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29922", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4402", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-29922 Batch detection script\nURL\uff1ahttps://github.com/1820112015/CVE-2023-29922\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-23T06:11:58.000000Z"}, {"uuid": "3b5a8e8e-402f-4b69-b728-4d09cc3514d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29929", "type": "seen", "source": "https://t.me/cvedetector/3820", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-29929 - Kemptechnologies Loadmaster Buffer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2023-29929 \nPublished : Aug. 21, 2024, 6:15 p.m. | 23\u00a0minutes ago \nDescription : Buffer Overflow vulnerability found in Kemptechnologies Loadmaster before v.7.2.60.0 allows a remote attacker to casue a denial of service via the libkemplink.so, isreverse library. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-21T20:46:10.000000Z"}, {"uuid": "a407c8d6-5ec1-4500-95c1-4c75fe1d0487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29923", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4403", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-29922 Batch detection script\nURL\uff1ahttps://github.com/1820112015/CVE-2023-29923\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-23T06:48:37.000000Z"}, {"uuid": "b26deffd-0b73-41c1-b98f-775035f9cb0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29927", "type": "seen", "source": "https://t.me/cibsecurity/64267", "content": "\u203c CVE-2023-29927 \u203c\n\nVersions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the \"Windows Peer-to-Peer Network\" or \"Client Server Network\" Sage 300 configurations, could recover the SQL connection strings being used by Sage 300 and interact directly with the underlying database(s) to create, update, and delete all company records, bypassing the program\u00e2\u20ac\u2122s role-based access controls.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T00:32:34.000000Z"}, {"uuid": "12cf28f4-e371-4e19-aa1b-c5733e7e1159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29924", "type": "seen", "source": "https://t.me/cibsecurity/62637", "content": "\u203c CVE-2023-29924 \u203c\n\nPowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-22T00:32:01.000000Z"}, {"uuid": "ece74f47-f906-4629-b45f-f4f4906faeb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29922", "type": "seen", "source": "https://t.me/cibsecurity/62479", "content": "\u203c CVE-2023-29922 \u203c\n\nPowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T22:30:23.000000Z"}, {"uuid": "a81b5c2e-45d1-4fed-b407-a265fecaab34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29923", "type": "seen", "source": "https://t.me/cibsecurity/62470", "content": "\u203c CVE-2023-29923 \u203c\n\nPowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T18:29:59.000000Z"}, {"uuid": "e7ac15e5-0086-4a59-b48f-0a7732bd75a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29921", "type": "seen", "source": "https://t.me/cibsecurity/62460", "content": "\u203c CVE-2023-29921 \u203c\n\nPowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-19T16:29:57.000000Z"}, {"uuid": "92c4a245-9faf-41ab-bbbb-9afb981cae1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29926", "type": "seen", "source": "https://t.me/cibsecurity/62527", "content": "\u203c CVE-2023-29926 \u203c\n\nPowerJob V4.3.2 has unauthorized interface that causes remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-20T18:30:55.000000Z"}]}