{"vulnerability": "CVE-2023-2526", "sightings": [{"uuid": "56d9570d-5fca-4023-8861-9bbeda735069", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25260", "type": "seen", "source": "https://t.me/cibsecurity/60898", "content": "\u203c CVE-2023-25260 \u203c\n\nStimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T18:39:44.000000Z"}, {"uuid": "76dedc89-af70-4bcb-8411-79a7ae719a7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25261", "type": "seen", "source": "Telegram/pV2QZrekMUNbyFPfVKK-81shULsCesRMJWsxWaDrbgUo5MER", "content": "", "creation_timestamp": "2025-02-19T19:13:54.000000Z"}, {"uuid": "872239a3-69d0-4c9b-9001-cc301927f112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25264", "type": "seen", "source": "https://t.me/cibsecurity/59109", "content": "\u203c CVE-2023-25264 \u203c\n\nAn issue was discovered in Docmosis Tornado prior to version 2.9.5. An unauthenticated attacker can bypass the authentication check filter completely by introducing a specially crafted request with relative path segments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T18:27:50.000000Z"}, {"uuid": "e5504259-5355-406b-80ea-834be5d8ef14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25265", "type": "seen", "source": "https://t.me/cibsecurity/59104", "content": "\u203c CVE-2023-25265 \u203c\n\nDocmosis Tornado &lt;= 2.9.4 is vulnerable to Directory Traversal leading to the disclosure of arbitrary content on the file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T18:27:42.000000Z"}, {"uuid": "0867a628-7695-4768-ac6c-ad52f262127c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25266", "type": "seen", "source": "https://t.me/cibsecurity/59103", "content": "\u203c CVE-2023-25266 \u203c\n\nAn issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T18:27:41.000000Z"}]}