{"vulnerability": "CVE-2023-2729", "sightings": [{"uuid": "ab26a6cb-ee1d-4d35-85f5-b528befcb42e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2729", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/47", "content": "1. CVE-2023-26369:\nAdobe PDF Reader RCE when processing TTF fonts\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html\n\n2. CVE-2023-2729:\nSynology NAS DSM Account Takeover\nhttps://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure\n\n3. CVE-2021-44168:\nDownload of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS &lt;7.0.3\nhttps://github.com/0xhaggis/CVE-2021-44168", "creation_timestamp": "2023-10-19T03:53:43.000000Z"}, {"uuid": "01fa4b33-f54d-4dd6-9b48-c2cfd8fa7db8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27295", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6998", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27295\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cross-site request forgery is facilitated by OpenCATS failure to require CSRF tokens in POST requests. An attacker can exploit this issue by creating a dummy page that executes Javascript in an authenticated user's session when visited.\n\ud83d\udccf Published: 2023-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-10T14:23:58.905Z\n\ud83d\udd17 References:\n1. https://www.tenable.com/security/research/tra-2023-8", "creation_timestamp": "2025-03-10T14:38:40.000000Z"}, {"uuid": "b8976485-64aa-44a7-b991-14cfee04f101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27298", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2958", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27298\n\ud83d\udd39 Description: Uncontrolled search path in the WULT software maintained by Intel(R) before version 1.0.0 (commit id 592300b) may allow an unauthenticated user to potentially enable escalation of privilege via network access.\n\ud83d\udccf Published: 2023-05-10T13:17:26.434Z\n\ud83d\udccf Modified: 2025-01-24T17:51:21.078Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00853.html", "creation_timestamp": "2025-01-24T18:05:01.000000Z"}, {"uuid": "371f95dc-7a24-415a-bed8-39481a858080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27292", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27292\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters.\n\ud83d\udccf Published: 2023-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T20:10:24.007Z\n\ud83d\udd17 References:\n1. https://www.tenable.com/security/research/tra-2023-8", "creation_timestamp": "2025-03-21T20:24:44.000000Z"}, {"uuid": "0b16a2ad-fedc-4463-9055-2b7cb8a82c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27295", "type": "seen", "source": "Telegram/iPDMbSs-KGGwA8gSPUsrkwDB2Qgt4GhkC4m0YlhqLTagG2RC", "content": "", "creation_timestamp": "2025-03-10T19:39:04.000000Z"}, {"uuid": "b51f2352-44e6-4d9b-a3d1-fbcdb94090ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27296", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/60793", "content": "\u203c CVE-2023-27296 \u203c\n\nDeserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong. It could be triggered by authenticated users of InLong, you could refer to [1] to know more about this vulnerability. This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick [2] to solve it. [1] https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html [2] https://github.com/apache/inlong/pull/7422 https://github.com/apache/inlong/pull/7422\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-27T18:20:17.000000Z"}, {"uuid": "3df63a0d-fabc-477c-8227-6b46238dcffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27291", "type": "seen", "source": "https://t.me/ctinow/198840", "content": "https://ift.tt/WMXnOur\nCVE-2023-27291", "creation_timestamp": "2024-03-03T17:26:54.000000Z"}, {"uuid": "3b9483f7-38a8-4b40-9ef6-67f238ef75f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27291", "type": "seen", "source": "https://t.me/ctinow/198837", "content": "https://ift.tt/WMXnOur\nCVE-2023-27291", "creation_timestamp": "2024-03-03T17:21:46.000000Z"}, {"uuid": "e6e785a1-c06b-4e44-9c8d-0c81b0ff7f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27293", "type": "seen", "source": "https://t.me/cibsecurity/59125", "content": "\u203c CVE-2023-27293 \u203c\n\nImproper neutralization of input during web page generation allows an unauthenticated attacker to submit malicious Javascript as the answer to a questionnaire which would then be executed when an authenticated user reviews the candidate's submission. This could be used to steal other users\u00e2\u20ac\u2122 cookies and force users to make actions without their knowledge.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T20:27:51.000000Z"}, {"uuid": "74bffed8-b08d-4d75-8dc3-5fddde2fd8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27290", "type": "seen", "source": "https://t.me/cibsecurity/59411", "content": "\u203c CVE-2023-27290 \u203c\n\nDocker based datastores for IBM Instana (IBM Observability with Instana 239-0 through 239-2, 241-0 through 241-2, and 243-0) do not currently require authentication. Due to this, an attacker within the network could access the datastores with read/write access. IBM X-Force ID: 248737.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-04T02:35:34.000000Z"}, {"uuid": "ea805040-5f3e-4665-8e66-2dceda2b676c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27295", "type": "seen", "source": "https://t.me/cibsecurity/59115", "content": "\u203c CVE-2023-27295 \u203c\n\nCross-site request forgery is facilitated by OpenCATS failure to require CSRF tokens in POST requests. An attacker can exploit this issue by creating a dummy page that executes Javascript in an authenticated user's session when visited.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T20:27:40.000000Z"}, {"uuid": "3d94894b-9313-4721-8ee9-dcc4374e8a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2729", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1414", "content": "#exploit\n1. CVE-2023-26369:\nAdobe PDF Reader RCE when processing TTF fonts\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html\n\n2. CVE-2023-2729:\nSynology NAS DSM Account Takeover\nhttps://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure\n\n3. CVE-2021-44168:\nDownload of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS &lt;7.0.3\nhttps://github.com/0xhaggis/CVE-2021-44168", "creation_timestamp": "2024-08-16T08:34:06.000000Z"}, {"uuid": "ed73ff5d-e013-4633-aa7b-6c06723b65a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27294", "type": "seen", "source": "https://t.me/cibsecurity/59131", "content": "\u203c CVE-2023-27294 \u203c\n\nImproper neutralization of input during web page generation allows an authenticated attacker with access to a restricted account to submit malicious Javascript as the description for a calendar event, which would then be executed in other users' browsers if they browse to that event. This could result in stealing session tokens from users with higher permission levels or forcing users to make actions without their knowledge.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-28T20:27:59.000000Z"}, {"uuid": "71deb553-6e1e-4a38-9ef9-0f3620f7c3b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2729", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9224", "content": "#exploit\n1. CVE-2023-26369:\nAdobe PDF Reader RCE when processing TTF fonts\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html\n\n2. CVE-2023-2729:\nSynology NAS DSM Account Takeover\nhttps://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure\n\n3. CVE-2021-44168:\nDownload of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS &lt;7.0.3\nhttps://github.com/0xhaggis/CVE-2021-44168", "creation_timestamp": "2023-10-19T11:01:11.000000Z"}]}