{"vulnerability": "cve-2023-3628", "sightings": [{"uuid": "664780b4-c281-44cc-903f-3b978eec10bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3628", "type": "seen", "source": "https://t.me/arpsyndicate/2036", "content": "#ExploitObserverAlert\n\nCVE-2023-3628\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-3628. A flaw was found in Infinispan's REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.", "creation_timestamp": "2023-12-20T15:41:05.000000Z"}, {"uuid": "88a24648-ea20-4fec-b7be-e6810fc5d312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36281", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5056", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC of CVE-2023-36281\nURL\uff1ahttps://github.com/tagomaru/CVE-2023-36281\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-31T21:35:07.000000Z"}, {"uuid": "ece33a85-ecfd-4010-b01e-eaf782d01c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36281", "type": "seen", "source": "https://t.me/cibsecurity/69014", "content": "\u203c CVE-2023-36281 \u203c\n\nAn issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-22T22:27:57.000000Z"}]}