{"vulnerability": "CVE-2023-2609", "sightings": [{"uuid": "6c0d0747-a478-4ea3-bb8e-9cad75b88039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26097", "type": "seen", "source": "Telegram/Px7hiuBBa518beIpuarZxQ2-YF38EY0wXdnPZSqiJJOAqP4s", "content": "", "creation_timestamp": "2025-02-06T02:41:38.000000Z"}, {"uuid": "65adb2c8-700d-47a7-b92a-f3ae1bae89bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2609", "type": "seen", "source": "https://t.me/cibsecurity/63688", "content": "\u203c CVE-2023-2609 \u203c\n\nNULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T22:45:11.000000Z"}, {"uuid": "a67c214f-10d7-4cb4-84f7-c49ecc418b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26097", "type": "seen", "source": "https://t.me/cibsecurity/62756", "content": "\u203c CVE-2023-26097 \u203c\n\nAn issue was discovered in Telindus Apsal 3.14.2022.235 b. Unauthorized actions that could modify the application behaviour may not be blocked.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-24T22:19:52.000000Z"}, {"uuid": "3cd43bf1-fd1e-4821-a84a-34c51091efed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26099", "type": "seen", "source": "https://t.me/cibsecurity/62749", "content": "\u203c CVE-2023-26099 \u203c\n\nAn issue was discovered in Telindus Apsal 3.14.2022.235 b. The consultation permission is insecure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-24T22:19:42.000000Z"}, {"uuid": "92895ac8-54e9-477c-a5b1-44efc66ad23d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26093", "type": "seen", "source": "https://t.me/cibsecurity/58511", "content": "\u203c CVE-2023-26093 \u203c\n\nLiima before 1.17.28 allows Hibernate query language (HQL) injection, related to colToSort in the deployment filter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-20T07:28:46.000000Z"}, {"uuid": "4a8bad46-716c-4ad5-9ef9-f6bb7634aaa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26098", "type": "seen", "source": "https://t.me/cibsecurity/62799", "content": "\u203c CVE-2023-26098 \u203c\n\nAn issue was discovered in the Open Document feature in Telindus Apsal 3.14.2022.235 b. An attacker may upload a crafted file to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-25T16:25:14.000000Z"}, {"uuid": "1031d066-3f84-4ef1-8fc5-a00e25b74158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26091", "type": "seen", "source": "https://t.me/cibsecurity/58904", "content": "\u203c CVE-2023-26091 \u203c\n\nThe frp_form_answers (aka Forms Export) extension before 3.1.2, and 4.x before 4.0.2, for TYPO3 allows XSS via saved emails.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-26T07:25:37.000000Z"}]}