{"vulnerability": "CVE-2023-29112", "sightings": [{"uuid": "6b133d1d-330a-4c43-838b-baaef973ea2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29112", "type": "seen", "source": "https://t.me/cibsecurity/61818", "content": "\u203c CVE-2023-29112 \u203c\n\nThe SAP Application Interface (Message Monitoring) - versions 600, 700, allows an authorized attacker to input links or headings with custom CSS classes into a comment. The comment will render links and custom CSS classes as HTML objects. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-11T07:23:04.000000Z"}]}