{"vulnerability": "CVE-2023-2861", "sightings": [{"uuid": "b1bfd663-063a-483d-8085-2bbe83f03fb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28611", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5377", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28611\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect authorization in OMICRON StationGuard 1.10 through 2.20 and StationScout 1.30 through 2.20 allows an attacker to bypass intended access restrictions.\n\ud83d\udccf Published: 2023-03-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T19:57:56.640Z\n\ud83d\udd17 References:\n1. https://www.omicronenergy.com/en/support/product-security/\n2. https://www.omicronenergy.com/fileadmin/user_upload/website/files/product-security/osa-6.txt", "creation_timestamp": "2025-02-25T20:23:05.000000Z"}, {"uuid": "1b83acf4-5daf-4dfd-833d-e84fcece6ead", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2861", "type": "seen", "source": "https://t.me/ctinow/197031", "content": "https://ift.tt/s7vrLMl\nCVE-2023-2861 QEMU Vulnerability in NetApp Products", "creation_timestamp": "2024-02-29T21:31:38.000000Z"}, {"uuid": "af5331e6-5f74-4396-9ba0-1c79eb2917d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2861", "type": "seen", "source": "https://t.me/arpsyndicate/1529", "content": "#ExploitObserverAlert\n\nCVE-2023-2861\n\nDESCRIPTION: Exploit Observer has 9 entries related to CVE-2023-2861.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2023-12-07T00:05:50.000000Z"}, {"uuid": "cb0dbe70-c9a5-4d8e-98c1-138a3c3c9139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2861", "type": "seen", "source": "https://t.me/ctinow/173509", "content": "https://ift.tt/K53zLgk\nCVE-2023-2861 QEMU Vulnerability in NetApp Products", "creation_timestamp": "2024-01-25T15:26:13.000000Z"}, {"uuid": "f1e6a27e-fcf5-4589-baaf-c6df9b470fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28614", "type": "seen", "source": "https://t.me/cibsecurity/70599", "content": "\u203c CVE-2023-28614 \u203c\n\nFreewill iFIS (aka SMART Trade) 20.01.01.04 allows OS Command Injection via shell metacharacters to a report page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-15T20:25:33.000000Z"}, {"uuid": "e1023676-be92-46ba-9687-cb05772356ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28611", "type": "seen", "source": "https://t.me/cibsecurity/60619", "content": "\u203c CVE-2023-28611 \u203c\n\nIncorrect authorization in OMICRON StationGuard 1.10 through 2.20 and StationScout 1.30 through 2.20 allows an attacker to bypass intended access restrictions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-23T23:36:56.000000Z"}, {"uuid": "3bd315fb-66fa-4499-8eac-2d989956c70d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28610", "type": "seen", "source": "https://t.me/cibsecurity/60589", "content": "\u203c CVE-2023-28610 \u203c\n\nThe update process in OMICRON StationGuard and OMICRON StationScout before 2.21 can be exploited by providing a modified firmware update image. This allows a remote attacker to gain root access to the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-23T19:36:48.000000Z"}, {"uuid": "3ec41586-74fd-4406-ba18-de7d2a150979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28616", "type": "seen", "source": "https://t.me/ctinow/159254", "content": "https://ift.tt/2xQ7194\nCVE-2023-28616", "creation_timestamp": "2023-12-26T05:26:25.000000Z"}, {"uuid": "8d705d30-e39a-4450-8e27-55df48567a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28613", "type": "seen", "source": "https://t.me/cibsecurity/61415", "content": "\u203c CVE-2023-28613 \u203c\n\nAn issue was discovered in Samsung Exynos Mobile Processor and Baseband Modem Processor for Exynos 1280, Exynos 2200, and Exynos Modem 5300. An integer overflow in IPv4 fragment handling can occur due to insufficient parameter validation when reassembling these fragments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-04T20:40:48.000000Z"}]}