{"vulnerability": "CVE-2023-2905", "sightings": [{"uuid": "a9955cbc-16f1-4680-8042-daec2918fad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2905", "type": "seen", "source": "http://takeonme.org/cves/cve-2023-2905/", "content": "", "creation_timestamp": "2023-08-08T16:37:00.000000Z"}, {"uuid": "17d07c90-baad-4f16-95d0-09ee83ee13c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2905", "type": "seen", "source": "http://takeonme.org/cve/", "content": "", "creation_timestamp": "2000-12-31T23:00:00.000000Z"}, {"uuid": "2e930a79-39b4-467e-973d-8801bd2c40f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29052\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Users were able to define disclaimer texts for an upsell shop dialog that would contain script code that was not sanitized correctly. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.\n\ud83d\udccf Published: 2024-01-08T09:04:35.617Z\n\ud83d\udccf Modified: 2025-06-17T20:29:16.141Z\n\ud83d\udd17 References:\n1. https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6251_7.10.6_2023-09-25.pdf\n2. https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0006.json", "creation_timestamp": "2025-06-17T20:40:11.000000Z"}, {"uuid": "50a5c292-b6cf-4abf-979d-908bf40f532d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29051", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18676", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29051\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: User-defined OXMF templates could be used to access a limited part of the internal OX App Suite Java API. The existing switch to disable the feature by default was not effective in this case. Unauthorized users could discover and modify application state, including objects related to other users and contexts. We now make sure that the switch to disable user-generated templates by default works as intended and will remove the feature in future generations of the product. No publicly available exploits are known.\n\ud83d\udccf Published: 2024-01-08T09:04:31.561Z\n\ud83d\udccf Modified: 2025-06-17T20:29:16.001Z\n\ud83d\udd17 References:\n1. https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6251_7.10.6_2023-09-25.pdf\n2. https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0006.json", "creation_timestamp": "2025-06-17T20:40:12.000000Z"}, {"uuid": "a0e5cf9f-1636-4f0b-8904-48ea2bbd492a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29055", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4334", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29055\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: In Apache Kylin version 2.0.0 to 4.0.3, there is a Server Config web interface that displays the content of file 'kylin.properties', that may contain serverside credentials. When the kylin service runs over HTTP (or other plain text protocol), it is possible for network sniffers to hijack the HTTP payload and get access to the content of kylin.properties and potentially the containing credentials.\n\nTo avoid this threat, users are recommended to\u00a0\n\n  *  Always turn on HTTPS so that network payload is encrypted.\n\n  *  Avoid putting credentials in kylin.properties, or at least not in plain text.\n  *  Use network firewalls to protect the serverside such that it is not accessible to external attackers.\n\n  *  Upgrade to version Apache Kylin 4.0.4, which filters out the sensitive content that goes to the Server Config web interface.\n\ud83d\udccf Published: 2024-01-29T15:30:25Z\n\ud83d\udccf Modified: 2025-02-13T19:33:17Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-29055\n2. https://github.com/apache/kylin/commit/b60d5ae694dffc2281bfe0ef464eada0b3a9b774\n3. https://github.com/apache/kylin\n4. https://lists.apache.org/thread/o1bvyv9wnfkx7dxpfjlor20nykgsoh6r\n5. http://www.openwall.com/lists/oss-security/2024/01/29/1", "creation_timestamp": "2025-02-13T20:12:59.000000Z"}, {"uuid": "9ffd8d45-d95c-4193-8e47-05021dbaf0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29055", "type": "seen", "source": "https://t.me/ctinow/189634", "content": "https://ift.tt/Odsavyp\nCVE-2023-29055 | Apache Kylin up to 4.0.3 Server Config Web Interface kylin.properties cleartext transmission", "creation_timestamp": "2024-02-21T14:41:51.000000Z"}, {"uuid": "01841b9e-4996-437c-b4c5-a8de6a209d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29059", "type": "exploited", "source": "https://t.me/true_secator/5250", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Qualys \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043e\u0442\u0447\u0435\u0442 \u0441 \u0430\u043d\u0430\u043b\u0438\u0437\u043e\u043c \u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u0430 \u0443\u0433\u0440\u043e\u0437 \u0437\u0430 2023 \u0433\u043e\u0434, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c \u0432\u044b\u0432\u043e\u0434\u0430\u043c \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u043d\u0435\u0435 1% \u0438\u0437 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c 26 000 \u0437\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u041f\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 2023 \u0433\u043e\u0434\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u0435\u0432\u044b\u0448\u0430\u0435\u0442 \u043e\u0431\u0449\u0435\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 2022 \u0433\u043e\u0434\u0443, \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c \u043d\u0430 1500 CVE.\u00a0\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u0442\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0440\u0438\u0441\u043a\u0430 \u043c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e. \u0422\u0440\u0435\u0442\u044c \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0440\u0438\u0441\u043a\u0430 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0430 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0438 \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f. \n\n\u0411\u043e\u043b\u0435\u0435 7000 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u043c\u0435\u043b\u0438 PoC, \u043e\u0434\u043d\u0430\u043a\u043e \u0432 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u043b\u0443\u0447\u0430\u0435 \u043a\u043e\u0434 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u043e\u0431\u044b\u0447\u043d\u043e \u0438\u043c\u0435\u043b \u043d\u0438\u0437\u043a\u043e\u0435 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u043e, \u0441\u043d\u0438\u0436\u0430\u044f \u0440\u0438\u0441\u043a \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438.\n\n\u0414\u043b\u044f 206 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0440\u0438\u0441\u043a\u0430 \u0431\u044b\u043b \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u043a\u043e\u0434 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0439\u0441\u044f \u0434\u043b\u044f \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043d\u0430\u0446\u0435\u043b\u0438\u0432\u0430\u043d\u0438\u044f. 115 \u0438\u0437 \u043d\u0438\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438, \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c\u0438 \u041f\u041e \u0438 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 (20), \u043f\u0440\u0435\u0436\u0434\u0435 \u0432\u0441\u0435\u0433\u043e LockBit, CL0P \u0438 Cerber.\n\n\u0412\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u043e\u0431\u0448\u0438\u0440\u043d\u044b\u0439 \u043d\u0430\u0431\u043e\u0440 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f, \u043f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e, PaperCut NG, MOVEit Transfer, \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u041e\u0421 Windows, Google Chrome, Atlassian Confluence \u0438 Apache ActiveMQ.\n\n109 \u0438\u043c\u0435\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438 \u0431\u044b\u043b\u0438 \u0432\u043d\u0435\u0441\u0435\u043d\u044b \u0432 CISA KEV, \u043d\u043e 97 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445, \u043d\u043e \u043d\u0435 \u043f\u043e\u043f\u0430\u043b\u0438 \u0432 \u0441\u043f\u0438\u0441\u043e\u043a.\n\n\u0412 2023 \u0433\u043e\u0434\u0443 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0442\u0435\u043d\u0434\u0435\u043d\u0446\u0438\u044f \u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0440\u0438\u0441\u043a\u0430.\n\n\u0421\u0440\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 2023 \u0433\u043e\u0434\u0443 \u0441\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u043e\u00a044 \u0434\u043d\u044f.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c 75 % \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 19 \u0434\u043d\u0435\u0439 (\u043f\u0440\u0438\u0431\u043b\u0438\u0437\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0442\u0440\u0438 \u043d\u0435\u0434\u0435\u043b\u0438) \u0441 \u043c\u043e\u043c\u0435\u043d\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u041e\u0434\u043d\u0430\u043a\u043e 25% \u043f\u0440\u043e\u0446\u0435\u043d\u0442\u043e\u0432 CVE \u0441 \u0432\u044b\u0441\u043e\u043a\u0438\u043c \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u0440\u0438\u0441\u043a\u0430 \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0432 \u0434\u0435\u043d\u044c \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438, \u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0431\u044b\u043b \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u0432 \u0434\u0435\u043d\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u043e\u0448\u0438\u0431\u043a\u0438. \n\n\u041e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u0442\u0430\u043a\u0442\u0438\u043a\u0430\u043c\u0438 MITRE ATT&amp;CK \u0441\u0442\u0430\u043b\u0438: \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432 (T1210 \u0438 T0866), \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 (T1190 \u0438 T0819) \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 (T1068).\n\n\u0421\u0440\u0435\u0434\u0438 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u044b: CVE-2023-0669, CVE-2023-20887, CVE-2023-22952, CVE-2023-23397, CVE-2023-24880, CVE-2023-27350, CVE-2023-28252, CVE-2023-2868, CVE-2023-29059, CVE-2023-34362.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0443 \u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u0430 \u0443\u0433\u0440\u043e\u0437 \u0432 2023 \u0433\u043e\u0434\u0443, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0438 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u0442\u0430\u043a\u0438\u0435 \u0442\u0440\u0435\u043d\u0434\u044b, \u043a\u0430\u043a \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0431\u044b\u0441\u0442\u0440\u044b\u0439 \u0442\u0435\u043c\u043f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u0440\u0443\u0436\u0438\u044f \u0438 \u043d\u0430\u043c\u0435\u0442\u0438\u0432\u0448\u0435\u0435\u0441\u044f \u0440\u0430\u0437\u043d\u043e\u043e\u0431\u0440\u0430\u0437\u0438\u0435 \u0441\u0443\u0431\u044a\u0435\u043a\u0442\u043e\u0432 \u0443\u0433\u0440\u043e\u0437, \u0447\u0442\u043e \u0432 \u0441\u043e\u0432\u043e\u043a\u0443\u043f\u043d\u043e\u0441\u0442\u0438 \u0441\u043e\u0437\u0434\u0430\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u0443\u0433\u0440\u043e\u0437\u044b \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u0432\u043e \u0432\u0441\u0435\u043c \u043c\u0438\u0440\u0435.", "creation_timestamp": "2023-12-27T12:34:26.000000Z"}, {"uuid": "04458b1c-263b-4fbd-ac50-94ddb95f0743", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29055", "type": "seen", "source": "https://t.me/ctinow/175255", "content": "https://ift.tt/r8S3g9l\nCVE-2023-29055", "creation_timestamp": "2024-01-29T14:31:24.000000Z"}, {"uuid": "fb36bb57-ea7f-4324-be44-f22b24978757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29051", "type": "seen", "source": "https://t.me/ctinow/164261", "content": "https://ift.tt/UxIetK1\nCVE-2023-29051", "creation_timestamp": "2024-01-08T10:26:27.000000Z"}, {"uuid": "ff209f6c-2b6d-4edc-a2b0-a31f9992916f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29050", "type": "seen", "source": "https://t.me/ctinow/173370", "content": "https://ift.tt/lGHjJO9\nCVE-2023-29050 | Open-Xchange OX App Suite up to 7.10.6-rev50/8.16 LDAP Contacts Provider ldap injection (oxas-adv-2023-0005)", "creation_timestamp": "2024-01-25T10:46:09.000000Z"}, {"uuid": "570f6208-9230-4be8-b174-d041fc75e787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29050", "type": "seen", "source": "https://t.me/ctinow/164260", "content": "https://ift.tt/nMkLPrT\nCVE-2023-29050", "creation_timestamp": "2024-01-08T10:26:26.000000Z"}, {"uuid": "541c7490-8695-43e5-bb05-c682850f0e1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29052", "type": "seen", "source": "https://t.me/ctinow/164262", "content": "https://ift.tt/ziZm5BI\nCVE-2023-29052", "creation_timestamp": "2024-01-08T10:26:28.000000Z"}, {"uuid": "46291405-00bc-4122-af90-032cd0ef510b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2905", "type": "seen", "source": "https://t.me/cibsecurity/68075", "content": "\u203c CVE-2023-2905 \u203c\n\nDue to a failure in validating the length of a provided MQTT_CMD_PUBLISH\u00c2\u00a0parsed message with a variable length header, Cesanta Mongoose, an\u00c2\u00a0embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-09T12:16:21.000000Z"}, {"uuid": "287ee73c-4392-4322-9b00-3aeb688e4a80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29058", "type": "seen", "source": "https://t.me/cibsecurity/63103", "content": "\u203c CVE-2023-29058 \u203c\n\nA valid, authenticated XCC user with read-only permissions can modify custom user roles on other user accounts and the user trespass message through the XCC CLI. There is no exposure if SSH is disabled or if there are no users assigned optional read-only permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-29T00:27:46.000000Z"}, {"uuid": "cbd064f3-a572-4934-b9d8-9b9b177c2c9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29057", "type": "seen", "source": "https://t.me/cibsecurity/63102", "content": "\u203c CVE-2023-29057 \u203c\n\nA valid XCC user's local account permissions overrides their active directory permissions under specific configurations. This could lead to a privilege escalation. To be vulnerable, LDAP must be configured for authentication/authorization and logins configured as \u00e2\u20ac\u0153Local First, then LDAP\u00e2\u20ac\ufffd.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-29T00:27:45.000000Z"}, {"uuid": "92e6ee5f-71fc-4b25-95a4-63ea29c3c881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29053", "type": "seen", "source": "https://t.me/cibsecurity/61850", "content": "\u203c CVE-2023-29053 \u203c\n\nA vulnerability has been identified in JT Open (All versions &lt; V11.3.2.0), JT Utilities (All versions &lt; V13.3.0.0). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T14:23:34.000000Z"}, {"uuid": "dc045c66-be2b-486b-a286-ae340a83bd9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29054", "type": "seen", "source": "https://t.me/cibsecurity/61846", "content": "\u203c CVE-2023-29054 \u203c\n\nA vulnerability has been identified in SCALANCE X200-4P IRT (All versions &lt; V5.5.2), SCALANCE X201-3P IRT (All versions &lt; V5.5.2), SCALANCE X201-3P IRT PRO (All versions &lt; V5.5.2), SCALANCE X202-2IRT (All versions &lt; V5.5.2), SCALANCE X202-2IRT (All versions &lt; V5.5.2), SCALANCE X202-2P IRT (All versions &lt; V5.5.2), SCALANCE X202-2P IRT PRO (All versions &lt; V5.5.2), SCALANCE X204IRT (All versions &lt; V5.5.2), SCALANCE X204IRT (All versions &lt; V5.5.2), SCALANCE X204IRT PRO (All versions &lt; V5.5.2), SCALANCE XF201-3P IRT (All versions &lt; V5.5.2), SCALANCE XF202-2P IRT (All versions &lt; V5.5.2), SCALANCE XF204-2BA IRT (All versions &lt; V5.5.2), SCALANCE XF204IRT (All versions &lt; V5.5.2), SIPLUS NET SCALANCE X202-2P IRT (All versions &lt; V5.5.2). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T14:23:27.000000Z"}, {"uuid": "e1ff904b-fd08-4d6f-ae5e-215351750ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29059", "type": "exploited", "source": "https://t.me/cibsecurity/61180", "content": "\u203c CVE-2023-29059 \u203c\n\n3CX DesktopApp through 18.12.416 has embedded malicious code, as exploited in the wild in March 2023. This affects versions 18.12.407 and 18.12.416 of the Electron Windows application shipped in Update 7, and versions 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 of the Electron macOS application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T20:21:26.000000Z"}]}