{"uuid": "49fd3674-8a84-4a35-88d1-e7d60cfd4e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38693", "type": "seen", "source": "https://t.me/cvedetector/19643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-38693 - Lucee Server XXE Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-38693 \nPublished : March 5, 2025, 4:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T18:37:05.000000Z"}