{"vulnerability": "CVE-2023-2806", "sightings": [{"uuid": "c33c1454-34b4-4055-993c-15014afea183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28063", "type": "seen", "source": "https://t.me/ctinow/196917", "content": "https://ift.tt/41LFn7P\nCVE-2023-28063 | Dell CPG BIOS up to 3.17.0 signed to unsigned conversion error (dsa-2023-176)", "creation_timestamp": "2024-02-29T18:56:50.000000Z"}, {"uuid": "eb0c9c0c-fc1c-4f21-bd04-dcd73db9a21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2806", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdj6cchi732i", "content": "", "creation_timestamp": "2026-01-28T21:02:59.628299Z"}, {"uuid": "b59c27ed-b697-44f5-a493-0791f15bcda9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28069", "type": "seen", "source": "https://t.me/cibsecurity/61449", "content": "\u203c CVE-2023-28069 \u203c\n\nDell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-05T12:28:10.000000Z"}, {"uuid": "12e9022f-7d48-4014-b43f-94bc05ff8897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28063", "type": "seen", "source": "https://t.me/ctinow/179846", "content": "https://ift.tt/HjO47UE\nCVE-2023-28063", "creation_timestamp": "2024-02-06T09:26:10.000000Z"}, {"uuid": "2d1c3103-ab05-4e6f-86f0-5ecb03ff47be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2806", "type": "seen", "source": "https://t.me/cibsecurity/64452", "content": "\u203c CVE-2023-2806 \u203c\n\nA vulnerability classified as problematic was found in Weaver e-cology up to 9.0. Affected by this vulnerability is the function RequestInfoByXml of the component API. The manipulation leads to xml external entity reference. The associated identifier of this vulnerability is VDB-229411. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-19T12:32:54.000000Z"}, {"uuid": "cb71c1e0-c696-44a7-8b3d-26abf8fba37b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28065", "type": "seen", "source": "https://t.me/cibsecurity/65457", "content": "\u203c CVE-2023-28065 \u203c\n\nDell Command | Update, Dell Update, and Alienware Update versions 4.8.0 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability leading to privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-23T16:46:49.000000Z"}, {"uuid": "1cdc6d1c-ebf1-4492-b7fe-e8ec80d16ada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28068", "type": "seen", "source": "https://t.me/cibsecurity/63358", "content": "\u203c CVE-2023-28068 \u203c\n\nDell Command Monitor, versions 10.9 and prior, contains an improper folder permission vulnerability. A local authenticated malicious user can potentially exploit this vulnerability leading to privilege escalation by writing to a protected directory when Dell Command Monitor is installed to a non-default path\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T12:24:22.000000Z"}, {"uuid": "7e94a2ab-ebd6-4ec7-aeba-0eba586a23d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28062", "type": "seen", "source": "https://t.me/cibsecurity/61872", "content": "\u203c CVE-2023-28062 \u203c\n\nDell PPDM versions 19.12, 19.11 and 19.10, contain an improper access control vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability to bypass intended access restrictions and perform unauthorized actions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T18:23:25.000000Z"}]}