{"vulnerability": "CVE-2023-2910", "sightings": [{"uuid": "3da3870b-4e58-4305-9a22-f6871582ba29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29102", "type": "seen", "source": "https://t.me/ctinow/157277", "content": "https://ift.tt/JZwaEoI\nCVE-2023-29102", "creation_timestamp": "2023-12-20T20:29:11.000000Z"}, {"uuid": "e5aed22b-26bc-4234-8840-2a5b46f70cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2910", "type": "seen", "source": "https://t.me/cibsecurity/68741", "content": "\u203c CVE-2023-2910 \u203c\n\nImproper neutralization of special elements used in a command ('Command Injection') vulnerability in Printer service functionality in ASUSTOR Data Master (ADM) allows remote unauthorized users to execute arbitrary commands via unspecified vectors. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-17T14:37:16.000000Z"}, {"uuid": "0dc0d21b-fd78-4b62-8339-2a5017fea1ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29108", "type": "seen", "source": "https://t.me/cibsecurity/61819", "content": "\u203c CVE-2023-29108 \u203c\n\nThe IP filter in ABAP Platform and SAP Web Dispatcher - versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T07:23:05.000000Z"}, {"uuid": "b100a50a-cb03-4be5-906c-799e9af325fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29100", "type": "seen", "source": "https://t.me/cibsecurity/65466", "content": "\u203c CVE-2023-29100 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dream-Theme The7 plugin &lt;=\u00c2\u00a011.6.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-23T16:47:04.000000Z"}, {"uuid": "98015675-c1ec-4b8f-ab01-4e584591c985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29109", "type": "seen", "source": "https://t.me/cibsecurity/61830", "content": "\u203c CVE-2023-29109 \u203c\n\nThe SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T07:23:19.000000Z"}, {"uuid": "cab806b4-ef74-409f-b695-c595214ba880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29105", "type": "seen", "source": "https://t.me/cibsecurity/63601", "content": "\u203c CVE-2023-29105 \u203c\n\nA vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions &gt;= V2.0 &lt; V2.1), SIMATIC Cloud Connect 7 CC712 (All versions &lt; V2.1), SIMATIC Cloud Connect 7 CC716 (All versions &gt;= V2.0 &lt; V2.1), SIMATIC Cloud Connect 7 CC716 (All versions &lt; V2.1). The affected device is vulnerable to a denial of service while parsing a random (non-JSON) MQTT payload. This could allow an attacker who can manipulate the communication between the MQTT broker and the affected device to cause a denial of service (DoS).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T16:38:37.000000Z"}, {"uuid": "45932b25-9608-4fab-996f-f50c8bb0705a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29104", "type": "seen", "source": "https://t.me/cibsecurity/63593", "content": "\u203c CVE-2023-29104 \u203c\n\nA vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions &gt;= V2.0 &lt; V2.1), SIMATIC Cloud Connect 7 CC716 (All versions &gt;= V2.0 &lt; V2.1). The filename in the upload feature of the web based management of the affected device is susceptible to a path traversal vulnerability. This could allow an authenticated privileged remote attacker to overwrite any file the Linux user `ccuser` has write access to, or to download any file the Linux user `ccuser` has read-only access to.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T16:38:27.000000Z"}, {"uuid": "48fa6176-c938-4311-8f33-6ae8a360cf74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29103", "type": "seen", "source": "https://t.me/cibsecurity/63597", "content": "\u203c CVE-2023-29103 \u203c\n\nA vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions &gt;= V2.0 &lt; V2.1), SIMATIC Cloud Connect 7 CC712 (All versions &lt; V2.1), SIMATIC Cloud Connect 7 CC716 (All versions &gt;= V2.0 &lt; V2.1), SIMATIC Cloud Connect 7 CC716 (All versions &lt; V2.1). The affected device uses a hard-coded password to protect the diagnostic files. This could allow an authenticated attacker to access protected data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T16:38:34.000000Z"}, {"uuid": "391d7cc5-d88b-4a31-89d6-0958ccd37b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29106", "type": "seen", "source": "https://t.me/cibsecurity/63605", "content": "\u203c CVE-2023-29106 \u203c\n\nA vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions &gt;= V2.0 &lt; V2.1), SIMATIC Cloud Connect 7 CC716 (All versions &gt;= V2.0 &lt; V2.1). The export endpoint is accessible via REST API without authentication. This could allow an unauthenticated remote attacker to download the files available via the endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T16:38:44.000000Z"}]}