{"vulnerability": "CVE-2023-2711", "sightings": [{"uuid": "b64eec39-d809-46cc-ab5f-7624b5f32158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27112", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbuvjv5jh2f", "content": "", "creation_timestamp": "2025-01-21T22:15:30.837022Z"}, {"uuid": "27a407a7-ea2c-4d5d-bf99-14a31c75f7c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27113", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbuvmcyj22b", "content": "", "creation_timestamp": "2025-01-21T22:15:33.124482Z"}, {"uuid": "2cc2ca8c-66fd-473f-94fe-8e4c5107615c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27119", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6020", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27119\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::Decompiler::WrapChild.\n\ud83d\udccf Published: 2023-03-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T21:38:19.531Z\n\ud83d\udd17 References:\n1. https://github.com/WebAssembly/wabt/issues/1990", "creation_timestamp": "2025-02-28T22:27:45.000000Z"}, {"uuid": "a76f375e-f8dd-4bc3-b848-c76834c262ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27112", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2494", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27112\n\ud83d\udd39 Description: pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the projectCode parameter at project.php.\n\ud83d\udccf Published: 2025-01-21T00:00:00\n\ud83d\udccf Modified: 2025-01-21T21:33:59.302353\n\ud83d\udd17 References:\n1. https://github.com/a54552239/pearProjectApi/issues/32", "creation_timestamp": "2025-01-21T22:01:10.000000Z"}, {"uuid": "43a2a4ea-0f64-499d-90a5-09f29eb72ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27113", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2492", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27113\n\ud83d\udd39 Description: pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the organizationCode parameter at project.php.\n\ud83d\udccf Published: 2025-01-21T00:00:00\n\ud83d\udccf Modified: 2025-01-21T21:35:48.110966\n\ud83d\udd17 References:\n1. https://github.com/a54552239/pearProjectApi/issues/31", "creation_timestamp": "2025-01-21T22:01:08.000000Z"}, {"uuid": "2bb9d1db-503c-4244-a738-ed550e6517be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27114", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5913", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27114\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c.\n\ud83d\udccf Published: 2023-03-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T16:17:08.586Z\n\ud83d\udd17 References:\n1. https://github.com/radareorg/radare2/issues/21363\n2. https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509", "creation_timestamp": "2025-02-28T16:26:55.000000Z"}, {"uuid": "9a0130d9-8d30-41d3-97e5-effa0b6543c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27113", "type": "seen", "source": "https://t.me/cvedetector/16041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-27113 - Pear Project API SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-27113 \nPublished : Jan. 21, 2025, 10:15 p.m. | 18\u00a0minutes ago \nDescription : pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the organizationCode parameter at project.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T23:40:33.000000Z"}, {"uuid": "993da9b5-dbe4-47f8-b054-ab8b869e6792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27112", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7500", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27112\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the projectCode parameter at project.php.\n\ud83d\udccf Published: 2025-01-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T20:33:00.682Z\n\ud83d\udd17 References:\n1. https://github.com/a54552239/pearProjectApi/issues/32", "creation_timestamp": "2025-03-13T20:43:07.000000Z"}, {"uuid": "6c5c4ae3-5552-4df4-a69d-ab494aff09f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27115", "type": "seen", "source": "Telegram/wbgrCPb2wurst0x6e1L-bo3o7WRkRreRXwKu9YbXBfTTnDm-", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}, {"uuid": "27f658ce-23e4-482f-9402-ef32a8e99e02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27112", "type": "seen", "source": "https://t.me/cvedetector/16040", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-27112 - Pear Project API SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-27112 \nPublished : Jan. 21, 2025, 10:15 p.m. | 18\u00a0minutes ago \nDescription : pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the projectCode parameter at project.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T23:40:33.000000Z"}, {"uuid": "249e6148-f5a6-483a-980c-af7d88ba22f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27114", "type": "seen", "source": "Telegram/12XWbUwg9n466lXZS4dMuT5YF_8sNHTcLO2ocQz7ongVnibv", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}, {"uuid": "609aab56-acf0-44ab-a7f0-f79dcbd0a06e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27119", "type": "seen", "source": "Telegram/sbAqfDKXi1o3QSihHE6C1zCONs2de4r5i60LNfYCG58lKwdB", "content": "", "creation_timestamp": "2025-03-02T11:46:29.000000Z"}]}