{"vulnerability": "CVE-2023-2173", "sightings": [{"uuid": "5fb6edc0-c01a-4e8f-96bf-d419764d662e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21735", "type": "seen", "source": "https://t.me/cibsecurity/56316", "content": "\u203c CVE-2023-21735 \u203c\n\nMicrosoft Office Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T00:44:49.000000Z"}, {"uuid": "ec81faea-56f2-45dc-8ed6-7b298a73c2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21734", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5990", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21734\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Office Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-01-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T21:15:07.753Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21734", "creation_timestamp": "2025-02-28T21:37:15.000000Z"}, {"uuid": "695d453c-7480-4064-b6f7-db10260d1c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21732", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21732\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft ODBC Driver Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-01-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T21:15:13.576Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21732", "creation_timestamp": "2025-02-28T21:37:14.000000Z"}, {"uuid": "3053de1f-7b9f-4306-9612-a9c43d8b11ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21738", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5993", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21738\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Office Visio Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-01-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T21:14:50.532Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21738", "creation_timestamp": "2025-02-28T21:37:17.000000Z"}, {"uuid": "d0bcb3b1-9ed2-46f7-9f65-2652a02b2afb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21737", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5992", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21737\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Office Visio Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-01-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T21:14:56.205Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21737", "creation_timestamp": "2025-02-28T21:37:17.000000Z"}, {"uuid": "f69dcce0-8b4e-41e6-82b7-2a194f610d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21735", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5991", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21735\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Office Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-01-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T21:15:01.845Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21735", "creation_timestamp": "2025-02-28T21:37:16.000000Z"}, {"uuid": "bf6e5c59-89c2-4b74-842e-a66ebd2d1b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2173", "type": "seen", "source": "https://t.me/cibsecurity/69527", "content": "\u203c CVE-2023-2173 \u203c\n\nThe BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_delete_step_ajax_handler, badgeos_delete_award_step_ajax_handler, badgeos_delete_deduct_step_ajax_handler, and badgeos_delete_rank_req_step_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T12:13:06.000000Z"}, {"uuid": "68593a67-f6f5-4e78-aa77-dd692cc4359b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21734", "type": "seen", "source": "https://t.me/cibsecurity/56316", "content": "\u203c CVE-2023-21735 \u203c\n\nMicrosoft Office Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21734.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T00:44:49.000000Z"}, {"uuid": "8c764a5c-04fd-4fff-8001-26024aebdfc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21739", "type": "seen", "source": "https://t.me/cibsecurity/56314", "content": "\u203c CVE-2023-21739 \u203c\n\nWindows Bluetooth Driver Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T00:42:07.000000Z"}, {"uuid": "d2943ac7-f7ba-4f69-a8c3-366cfe706080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21732", "type": "seen", "source": "https://t.me/cibsecurity/56311", "content": "\u203c CVE-2023-21732 \u203c\n\nMicrosoft ODBC Driver Remote Code Execution Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T00:42:03.000000Z"}, {"uuid": "60b58a87-9cfc-4513-8dad-934833e36014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21733", "type": "seen", "source": "https://t.me/cibsecurity/56306", "content": "\u203c CVE-2023-21733 \u203c\n\nWindows Bind Filter Driver Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T00:41:55.000000Z"}]}