{"vulnerability": "CVE-2023-2479", "sightings": [{"uuid": "1acbfd6d-dec7-417c-983b-2772fda8db61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24796", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mgvcd3erof2q", "content": "", "creation_timestamp": "2026-03-12T21:02:34.694981Z"}, {"uuid": "eee7adca-dfba-4823-a00c-7e469eecce81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24797", "type": "seen", "source": "Telegram/62s7BMNnh7yWhPeCoNwCFSITDXnJzi79y-Tv1a6KLx9G5c1G", "content": "", "creation_timestamp": "2025-02-14T10:08:10.000000Z"}, {"uuid": "0914d453-ac0e-4e72-bf15-fdd54a1ca25b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24798", "type": "seen", "source": "Telegram/LW_9yy3IgcHCPiOiPLYRV1wOj7nMpfdfqW_UMltijyn2srkA", "content": "", "creation_timestamp": "2025-02-14T10:08:10.000000Z"}, {"uuid": "165e5702-f3b4-45c9-b863-2180ceb51772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24799", "type": "seen", "source": "Telegram/GyjGB3BR_xvWJ4XjnqyA6nn8hg-vJSpaPUKOe3J0z15TL6Bw", "content": "", "creation_timestamp": "2025-02-14T10:06:10.000000Z"}, {"uuid": "16d381eb-1d2f-40d6-8ce8-ca2cc99acff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24798", "type": "seen", "source": "Telegram/iGsHjGGz8edbEhVRe0Rlf6fotfqJTyDweCFj2-DksklyDwfw", "content": "", "creation_timestamp": "2025-02-14T10:06:10.000000Z"}, {"uuid": "3c96e98d-f979-4a22-a8b7-3a3bbc75fa5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2479", "type": "seen", "source": "https://t.me/arpsyndicate/538", "content": "#ExploitObserverAlert\n\nCVE-2023-2479\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-2479. OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.\n\nFIRST-EPSS: 0.961880000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-24T17:10:00.000000Z"}, {"uuid": "0853a7d9-6801-46b6-967f-9c8fce718b36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24796", "type": "seen", "source": "https://t.me/ctinow/216627", "content": "https://ift.tt/YSOokVE\nScans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796, (Thu, May 2nd)", "creation_timestamp": "2024-05-02T21:31:23.000000Z"}, {"uuid": "96d011ec-f5ad-45cd-a889-e95ee3d82ab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24796", "type": "seen", "source": "https://t.me/cibsecurity/62890", "content": "\u203c CVE-2023-24796 \u203c\n\nPassword vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-26T16:25:46.000000Z"}, {"uuid": "0b4169f6-f9dc-4993-af25-758b6abc1236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2479", "type": "seen", "source": "https://t.me/cibsecurity/63162", "content": "\u203c CVE-2023-2479 \u203c\n\nOS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T18:30:11.000000Z"}, {"uuid": "584dbfc5-c3cb-4e31-bb07-1bb115c1034f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24799", "type": "seen", "source": "https://t.me/cibsecurity/61642", "content": "\u203c CVE-2023-24799 \u203c\n\nD-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_48AF78 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:18.000000Z"}, {"uuid": "3f967d73-43e7-4e99-b5a5-aabe553acd42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24795", "type": "seen", "source": "https://t.me/cibsecurity/60101", "content": "\u203c CVE-2023-24795 \u203c\n\nCommand execution vulnerability was discovered in JHR-N916R router firmware version&lt;=21.11.1.1483.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-16T06:30:21.000000Z"}]}