{"vulnerability": "CVE-2023-2700", "sightings": [{"uuid": "52f38621-88d4-4bf9-a065-0ae9dc9570d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2700", "type": "seen", "source": "https://t.me/arpsyndicate/4654", "content": "#ExploitObserverAlert\n\nCVE-2023-2700\n\nDESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to CVE-2023-2700. A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.7000953", "creation_timestamp": "2024-04-13T12:54:01.000000Z"}, {"uuid": "b3d4443a-f687-47e6-9eea-4943afcbea30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27000", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18800", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27000\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cross Site Scripting vulnerability found in NetScoutnGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code via the name parameter of the Profile and Exclusion List page(s).\n\ud83d\udccf Published: 2024-01-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T16:56:47.292Z\n\ud83d\udd17 References:\n1. http://netscout.com\n2. http://ngeniusone.com\n3. https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/", "creation_timestamp": "2025-06-18T17:39:06.000000Z"}, {"uuid": "ede781e1-f1ac-4791-a424-0c6af421e58c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27008", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m2cxppqm2x23", "content": "", "creation_timestamp": "2025-10-03T21:02:30.682709Z"}, {"uuid": "870c39b8-6c51-49b1-9424-0b40ec30d322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27008", "type": "seen", "source": "Telegram/Dl3znzLPzoP-cgpG8oJgO7XtbOQC-5Y3c0eHZ-BL4-WM4pQb", "content": "", "creation_timestamp": "2025-02-18T23:42:22.000000Z"}, {"uuid": "ed97e409-6764-451c-8a77-f96b34cb9016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2700", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5977", "content": "|       CVE-2021-3569   2.1     https://vulners.com/cve/CVE-2021-3569\n|       CVE-2021-3527   2.1     https://vulners.com/cve/CVE-2021-3527                               |       CVE-2021-3446   2.1     https://vulners.com/cve/CVE-2021-3446                               |       CVE-2021-3416   2.1     https://vulners.com/cve/CVE-2021-3416                               |       CVE-2021-20320  2.1     https://vulners.com/cve/CVE-2021-20320\n|       CVE-2021-20297  2.1     https://vulners.com/cve/CVE-2021-20297                              |       CVE-2021-20257  2.1     https://vulners.com/cve/CVE-2021-20257                              |       CVE-2021-20239  2.1     https://vulners.com/cve/CVE-2021-20239                              |       CVE-2021-20221  2.1     https://vulners.com/cve/CVE-2021-20221\n|       CVE-2020-25743  2.1     https://vulners.com/cve/CVE-2020-25743\n|       CVE-2020-12458  2.1     https://vulners.com/cve/CVE-2020-12458\n|       CVE-2020-10756  2.1     https://vulners.com/cve/CVE-2020-10756\n|       CVE-2019-18391  2.1     https://vulners.com/cve/CVE-2019-18391\n|       CVE-2019-14826  2.1     https://vulners.com/cve/CVE-2019-14826\n|       CVE-2019-13313  2.1     https://vulners.com/cve/CVE-2019-13313                              |       CVE-2019-12067  2.1     https://vulners.com/cve/CVE-2019-12067                              |       CVE-2019-11884  2.1     https://vulners.com/cve/CVE-2019-11884                              |       CVE-2019-11833  2.1     https://vulners.com/cve/CVE-2019-11833                              |       CVE-2019-11135  2.1     https://vulners.com/cve/CVE-2019-11135                              |       CVE-2019-10183  2.1     https://vulners.com/cve/CVE-2019-10183                              |       CVE-2018-16878  2.1     https://vulners.com/cve/CVE-2018-16878                              |       CVE-2004-0554   2.1     https://vulners.com/cve/CVE-2004-0554                               |       1AC912AC-B7DA-5F88-B22A-12B17E5D1D5C    2.1       https://vulners.com/githubexploit/1AC912AC-B7DA-5F88-B22A-12B17E5D1D5C    *EXPLOIT*\n|       CVE-2023-1289   1.9     https://vulners.com/cve/CVE-2023-1289\n|       CVE-2022-25310  1.9     https://vulners.com/cve/CVE-2022-25310                              |       CVE-2022-25309  1.9     https://vulners.com/cve/CVE-2022-25309                              |       CVE-2021-4217   1.9     https://vulners.com/cve/CVE-2021-4217                               |       CVE-2021-3753   1.9     https://vulners.com/cve/CVE-2021-3753                               |       CVE-2021-3602   1.9     https://vulners.com/cve/CVE-2021-3602                               |       CVE-2020-25656  1.9     https://vulners.com/cve/CVE-2020-25656                              |       CVE-2019-2634   1.9     https://vulners.com/cve/CVE-2019-2634                               |       CVE-2019-2535   1.9     https://vulners.com/cve/CVE-2019-2535                               |       CVE-2019-18660  1.9     https://vulners.com/cve/CVE-2019-18660\n|       PRION:CVE-2023-22024    1.7     https://vulners.com/prion/PRION:CVE-2023-22024\n|       CVE-2023-3161   1.7     https://vulners.com/cve/CVE-2023-3161\n|       CVE-2023-28328  1.7     https://vulners.com/cve/CVE-2023-28328\n|       CVE-2023-28327  1.7     https://vulners.com/cve/CVE-2023-28327\n|       CVE-2023-2700   1.7     https://vulners.com/cve/CVE-2023-2700\n|       CVE-2023-2602   1.7     https://vulners.com/cve/CVE-2023-2602\n|       CVE-2023-1981   1.7     https://vulners.com/cve/CVE-2023-1981\n|       CVE-2023-1095   1.7     https://vulners.com/cve/CVE-2023-1095                               |       CVE-2022-2153   1.7     https://vulners.com/cve/CVE-2022-2153\n|       CVE-2022-1263   1.7     https://vulners.com/cve/CVE-2022-1263", "creation_timestamp": "2023-11-15T16:53:03.000000Z"}, {"uuid": "cc549ebb-f6bc-4324-a6fb-7c8942ceda1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27001", "type": "seen", "source": "https://t.me/ctinow/198395", "content": "https://ift.tt/Oi5Ur7V\nCVE-2023-27001 | Egerie Risk Manager 4.0.5 JWT signature verification", "creation_timestamp": "2024-03-02T15:46:14.000000Z"}, {"uuid": "7fc8fce5-7853-4a1c-83a2-6d1892e1fd19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27001", "type": "seen", "source": "https://t.me/ctinow/185798", "content": "https://ift.tt/AmjhnRd\nCVE-2023-27001 Exploit", "creation_timestamp": "2024-02-15T19:17:09.000000Z"}, {"uuid": "6c93d829-4080-4dea-82a3-ed6a445fb915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27001", "type": "seen", "source": "https://t.me/ctinow/181699", "content": "https://ift.tt/dtxj1mi\nCVE-2023-27001", "creation_timestamp": "2024-02-08T23:32:06.000000Z"}, {"uuid": "44934667-a213-492e-a921-b77585023f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27000", "type": "seen", "source": "https://t.me/ctinow/164770", "content": "https://ift.tt/IcOYN4a\nCVE-2023-27000", "creation_timestamp": "2024-01-09T03:26:10.000000Z"}, {"uuid": "5af389bd-7654-4834-8f2f-7b182167e114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27000", "type": "seen", "source": "https://t.me/ctinow/166995", "content": "https://ift.tt/VmRYnIC\nCVE-2023-27000 Exploit", "creation_timestamp": "2024-01-12T01:52:04.000000Z"}, {"uuid": "592bac68-a4e9-4578-8497-9c3122bbe773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27000", "type": "seen", "source": "https://t.me/ctinow/164824", "content": "https://ift.tt/R2OLEdc\nCVE-2023-27000 | NetScout nGeniusOne 6.3.4 Profile/Exclusion List Page name cross site scripting", "creation_timestamp": "2024-01-09T07:31:50.000000Z"}, {"uuid": "144a814b-4c91-426c-b907-1a7bb9da9878", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2700", "type": "seen", "source": "https://t.me/cibsecurity/64175", "content": "\u203c CVE-2023-2700 \u203c\n\nA vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-16T02:29:53.000000Z"}, {"uuid": "54a0bd01-06d9-4559-857f-b20b8fce3870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27008", "type": "seen", "source": "https://t.me/cibsecurity/60894", "content": "\u203c CVE-2023-27008 \u203c\n\nA Cross-site scripting (XSS) vulnerability in the function encrypt_password() in login.tmpl.php in ATutor 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the token parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T18:39:40.000000Z"}]}