{"vulnerability": "CVE-2023-2654", "sightings": [{"uuid": "e55965b2-eff9-4809-82f6-85774162c4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26545", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "e76784ca-7d87-48c9-83be-59b87d9a3cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26546", "type": "seen", "source": "https://t.me/cibsecurity/63181", "content": "\u203c CVE-2023-26546 \u203c\n\nEuropean Chemicals Agency IUCLID before 6.27.6 allows remote authenticated users to execute arbitrary code via Server Side Template Injection (SSTI) with a crafted template file. The attacker must have template manager permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-03T00:30:32.000000Z"}, {"uuid": "f15b2b92-3934-4ff6-b90c-a645519f9437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26549", "type": "seen", "source": "Telegram/SC-K9NXS6xq7mpSE7RK7N7f-gUjuxRIigxkvW5zTSjA0Qq15", "content": "", "creation_timestamp": "2025-02-19T19:13:54.000000Z"}, {"uuid": "814b66d9-db5e-4d73-b38a-4c7e73a552c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26549", "type": "seen", "source": "https://t.me/cibsecurity/60848", "content": "\u203c CVE-2023-26549 \u203c\n\nThe SystemUI module has a vulnerability of repeated app restart due to improper parameters. Successful exploitation of this vulnerability may affect confidentiality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T02:26:18.000000Z"}, {"uuid": "efa8a63e-32ff-48ae-aa7d-1c4da1edc839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26548", "type": "seen", "source": "https://t.me/cibsecurity/60855", "content": "\u203c CVE-2023-26548 \u203c\n\nThe pgmng module has a vulnerability in serialization/deserialization. Successful exploitation of this vulnerability may affect availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T02:26:25.000000Z"}, {"uuid": "afebca18-4c65-4f52-95f1-9c58afe3a0af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26547", "type": "seen", "source": "https://t.me/cibsecurity/60853", "content": "\u203c CVE-2023-26547 \u203c\n\nThe InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T02:26:24.000000Z"}]}