{"vulnerability": "cve-2023-3833", "sightings": [{"uuid": "fbd9d1c9-2e3a-453d-af5d-0682832e88b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38332", "type": "seen", "source": "https://t.me/cibsecurity/67791", "content": "\u203c CVE-2023-38332 \u203c\n\nZoho ManageEngine ADManager Plus through 7201 allow authenticated users to take over another user's account via sensitive information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-04T22:41:10.000000Z"}, {"uuid": "bb96bae0-2c54-4594-b979-bdfebeaf30a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38333", "type": "seen", "source": "Telegram/IQqI7_o3As03Styr3wGzfPJhxaV4wyxF-ya0oVMGsrze28lx", "content": "", "creation_timestamp": "2025-03-08T04:35:52.000000Z"}, {"uuid": "99e8344b-423f-4ded-bde3-23b7eac0723f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3833", "type": "seen", "source": "https://t.me/cibsecurity/67120", "content": "\u203c CVE-2023-3833 \u203c\n\nA vulnerability was found in Bug Finder Montage 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-22T21:58:13.000000Z"}, {"uuid": "9af863b6-107e-46d7-8183-98b1cc01da11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38333", "type": "seen", "source": "https://t.me/cibsecurity/68249", "content": "\u203c CVE-2023-38333 \u203c\n\nZoho ManageEngine Applications Manager through 16530 allows reflected XSS while logged in.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T00:16:00.000000Z"}, {"uuid": "7aa817bd-b8f5-41af-ba90-2b67ae2c163a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38330", "type": "seen", "source": "https://t.me/cibsecurity/67591", "content": "\u203c CVE-2023-38330 \u203c\n\nOXID eShop Enterprise Edition 6.5.0 \u00e2\u20ac\u201c 6.5.2 before 6.5.3 allows uploading files with modified headers in the administration area. An attacker can upload a file with a modified header to create a HTTP Response Splitting attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T18:39:17.000000Z"}, {"uuid": "d2135236-11ce-46b6-a82e-c1bcd46715d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38336", "type": "seen", "source": "https://t.me/cibsecurity/66768", "content": "\u203c CVE-2023-38336 \u203c\n\nnetkit-rcp in rsh-client 0.17-24 allows command injection via filenames because /bin/sh is used by susystem, a related issue to CVE-2006-0225, CVE-2019-7283, and CVE-2020-15778.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T02:22:46.000000Z"}, {"uuid": "d9192155-d002-4d1a-b33e-3a22c3037bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38337", "type": "seen", "source": "https://t.me/cibsecurity/66765", "content": "\u203c CVE-2023-38337 \u203c\n\nrswag before 2.10.1 allows remote attackers to read arbitrary JSON and YAML files via directory traversal, because rswag-api can expose a file that is not the OpenAPI (or Swagger) specification file of a project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T02:22:43.000000Z"}]}