{"vulnerability": "cve-2023-3832", "sightings": [{"uuid": "f365c3d5-214a-4bc5-84c2-76cdaced0fc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38328", "type": "seen", "source": "https://t.me/cibsecurity/73022", "content": "\u203c CVE-2023-38328 \u203c\n\nAn issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-27T02:16:08.000000Z"}, {"uuid": "ebd774b5-49ed-4979-a8de-911dd088a6a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38325", "type": "seen", "source": "https://t.me/ctinow/180987", "content": "https://ift.tt/qOugYiG\nCVE-2023-38325 | Oracle Communications Diameter Signaling Router 9.0.0.0 Platform unknown vulnerability", "creation_timestamp": "2024-02-07T21:51:53.000000Z"}, {"uuid": "a90e50c0-5b6f-4d76-8dd5-1ad29cc40977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38325", "type": "seen", "source": "https://t.me/ctinow/180865", "content": "https://ift.tt/VO6cf2j\nCVE-2023-38325 | Oracle Communications Cloud Native Core Network Repository Function Install/Upgrade certificate validation", "creation_timestamp": "2024-02-07T18:12:05.000000Z"}, {"uuid": "cfb051cf-81a5-43dc-873b-8c579b5dc64a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38321", "type": "seen", "source": "https://t.me/ctinow/159181", "content": "https://ift.tt/xR3cj8P\nCVE-2023-38321", "creation_timestamp": "2023-12-25T10:31:32.000000Z"}, {"uuid": "6503b46c-9304-4c6c-b020-ad36ac47d5c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38323", "type": "seen", "source": "https://t.me/ctinow/178226", "content": "https://ift.tt/F0s1dcl\nCVE-2023-38323 Exploit", "creation_timestamp": "2024-02-02T19:16:57.000000Z"}, {"uuid": "15f9242a-a4dd-4365-a826-1b39c7744265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38323", "type": "seen", "source": "https://t.me/ctinow/174008", "content": "https://ift.tt/A0kDujV\nCVE-2023-38323", "creation_timestamp": "2024-01-26T06:26:16.000000Z"}, {"uuid": "fca4037e-93eb-46ce-842f-f955f4951992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38321", "type": "seen", "source": "https://t.me/ctinow/170105", "content": "https://ift.tt/rZmfR4e\nCVE-2023-38321 | Sierra Wireless ALEOS prior 4.17.0.12 OpenNDS /opennds_auth/ null pointer dereference", "creation_timestamp": "2024-01-19T09:16:25.000000Z"}, {"uuid": "e794cf26-12ef-4f74-b830-ca16cc8bc119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3832", "type": "seen", "source": "https://t.me/cibsecurity/67119", "content": "\u203c CVE-2023-3832 \u203c\n\nA vulnerability was found in Bug Finder Wedding Wonders 1.0. It has been classified as problematic. Affected is an unknown function of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-235158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-22T20:24:35.000000Z"}]}