{"vulnerability": "CVE-2023-2758", "sightings": [{"uuid": "8071679d-dfa2-4434-b2c9-7f07a84aed30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27585", "type": "seen", "source": "https://t.me/cibsecurity/60012", "content": "\u203c CVE-2023-27585 \u203c\n\nPJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-14T19:30:27.000000Z"}, {"uuid": "aa4c6595-a8d6-4090-b68e-c45fc6e766cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27587", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3946", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aThe simple PoC of CVE-2023-27587\nURL\uff1ahttps://github.com/sec-fx/CVE-2023-27587-PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-16T08:24:44.000000Z"}, {"uuid": "f3193aac-bcc1-447c-8a37-7d6f1e6ec365", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27584", "type": "seen", "source": "https://t.me/cvedetector/6085", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-27584 - Dragonfly Hardcoded Secret Key Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2023-27584 \nPublished : Sept. 19, 2024, 11:15 p.m. | 41\u00a0minutes ago \nDescription : Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, \"Secret Key\", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T02:11:46.000000Z"}, {"uuid": "c90d9aff-c70b-456d-981d-78d2794d6079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27586", "type": "seen", "source": "https://t.me/cibsecurity/60328", "content": "\u203c CVE-2023-27586 \u203c\n\nCairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to version 2.7.0, Cairo can send requests to external hosts when processing SVG files. A malicious actor could send a specially crafted SVG file that allows them to perform a server-side request forgery or denial of service. Version 2.7.0 disables CairoSVG's ability to access other files online by default.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-20T21:04:15.000000Z"}, {"uuid": "1f945e46-a29e-4208-927d-73156bde84d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27580", "type": "seen", "source": "https://t.me/cibsecurity/59928", "content": "\u203c CVE-2023-27580 \u203c\n\nCodeIgniter Shield provides authentication and authorization for the CodeIgniter 4 PHP framework. An improper implementation was found in the password storage process. All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible. If an attacker gets (1) the user's hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user's password. Upgrade to Shield v1.0.0-beta.4 or later to fix this issue. After upgrading, all users\u00e2\u20ac\u2122 hashed passwords should be updated (saved to the database). There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-13T21:53:28.000000Z"}, {"uuid": "a86b0726-7285-42b7-9e9c-7f7aee5ecaaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27587", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "363096aa-187d-488c-908b-3709ab53cfee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27584", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/14084", "content": "\u200aCritical Dragonfly2 Flaw CVE-2023-27584: Hardcoded Key Threatens Admin Access\n\nhttps://securityonline.info/critical-dragonfly2-flaw-cve-2023-27584-hardcoded-key-threatens-admin-access/", "creation_timestamp": "2024-09-23T10:55:29.000000Z"}, {"uuid": "06d324b8-dc08-4f4f-b1f8-3645a8b1fb06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27587", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7945", "content": "#exploit\n1. CVE-2023-23396:\nMicrosoft Excel DoS Vulnerability\nhttps://github.com/LucaBarile/CVE-2023-23396\n\n2. CVE-2023-27842:\neXtplorer 2.1.15 - Insecure Permissions following RCE (Authenticated)\nhttps://github.com/tristao-marinho/CVE-2023-27842\n\n3. CVE-2023-27587:\nReadtoMyShoe - Generation of Error Message Containing Sensitive Information\nhttps://github.com/sec-fx/CVE-2023-27587-PoC", "creation_timestamp": "2023-03-17T11:01:01.000000Z"}, {"uuid": "2ff5dd6d-0ab6-42c8-aaf8-ebc3bf0d3cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27588", "type": "seen", "source": "https://t.me/cibsecurity/60024", "content": "\u203c CVE-2023-27588 \u203c\n\nHasura is an open-source product that provides users GraphQL or REST APIs. A path traversal vulnerability has been discovered within Hasura GraphQL Engine prior to versions 1.3.4, 2.55.1, 2.20.1, and 2.21.0-beta1. Projects running on Hasura Cloud were not vulnerable. Self-hosted Hasura Projects with deployments that are publicly exposed and not protected by a WAF or other HTTP protection layer should be upgraded to version 1.3.4, 2.55.1, 2.20.1, or 2.21.0-beta1 to receive a patch.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-14T21:23:18.000000Z"}, {"uuid": "1c7fd247-9b19-4fc6-90ba-5a871cb8d942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27589", "type": "seen", "source": "https://t.me/cibsecurity/60022", "content": "\u203c CVE-2023-27589 \u203c\n\nMinio is a Multi-Cloud Object Storage framework. Starting with RELEASE.2020-12-23T02-24-12Z and prior to RELEASE.2023-03-13T19-46-17Z, a user with `consoleAdmin` permissions can potentially create a user that matches the root credential `accessKey`. Once this user is created successfully, the root credential ceases to work appropriately. The issue is patched in RELEASE.2023-03-13T19-46-17Z. There are ways to work around this via adding higher privileges to the disabled root user via `mc admin policy set`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-14T21:23:16.000000Z"}]}