{"vulnerability": "CVE-2023-3019", "sightings": [{"uuid": "3374eb8f-8418-4107-bc55-f98a7169dd09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30192", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lreckkhkef24", "content": "", "creation_timestamp": "2025-06-11T21:02:25.135624Z"}, {"uuid": "af217f95-d2e3-4fcf-a420-216c5919e900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30190", "type": "seen", "source": "https://t.me/cKure/11940", "content": "\u25a0\u25a1\u25a1\u25a1\u25a1 CVE-2023-30190 (Folina) demo on windows office.\n\nhttps://www.facebook.com/share/r/1sTsufbUiqV8Arvc/", "creation_timestamp": "2023-11-07T02:10:27.000000Z"}, {"uuid": "392957cd-78b6-468c-ae5d-5341b3f5c9a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30194", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lunw556o6h23", "content": "", "creation_timestamp": "2025-07-23T21:02:23.589896Z"}, {"uuid": "622013fa-ef9f-49e1-8f4e-7fcef8aa6486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30192", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-30192.yaml", "content": "", "creation_timestamp": "2025-06-09T14:27:13.000000Z"}, {"uuid": "3c37a5e3-bd9b-47c7-97e4-e906d0a2fa6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30194", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m2zlw2tbbs2q", "content": "", "creation_timestamp": "2025-10-12T21:02:34.022275Z"}, {"uuid": "8b196d60-22ab-4267-940d-ef2271c3171e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30194", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-30194.yaml", "content": "", "creation_timestamp": "2025-10-10T16:29:19.000000Z"}, {"uuid": "677a5bdf-1722-424f-822a-44ec7804df42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3019", "type": "seen", "source": "https://t.me/cibsecurity/67163", "content": "\u203c CVE-2023-3019 \u203c\n\nA DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-24T20:26:19.000000Z"}, {"uuid": "20150833-d0bc-462d-9e85-cf7a91d5040b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30195", "type": "seen", "source": "https://t.me/cibsecurity/66162", "content": "\u203c CVE-2023-30195 \u203c\n\nIn the module \"Detailed Order\" (lgdetailedorder) in version up to 1.1.20 from Linea Grafica for PrestaShop, a guest can download personal informations without restriction formatted in json.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-07T00:20:36.000000Z"}, {"uuid": "f5554aef-ff91-4e8b-8b37-81198f85ba67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30196", "type": "seen", "source": "https://t.me/cibsecurity/64783", "content": "\u203c CVE-2023-30196 \u203c\n\nPrestashop salesbooster &lt;= 1.10.4 is vulnerable to Incorrect Access Control via modules/salesbooster/downloads/download.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-30T16:18:40.000000Z"}, {"uuid": "a6a56095-2453-4baa-be76-970f837bbdc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30191", "type": "seen", "source": "https://t.me/cibsecurity/64353", "content": "\u203c CVE-2023-30191 \u203c\n\nPrestaShop cdesigner &lt; 3.1.9 is vulnerable to SQL Injection via CdesignerTraitementModuleFrontController::initContent().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T00:36:35.000000Z"}]}