{"vulnerability": "CVE-2023-3032", "sightings": [{"uuid": "a0ccd32f-daea-470c-b386-f84e4b08e4f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3032", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/754", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3032\n\ud83d\udd39 Description: Unrestricted Upload of File with Dangerous Type vulnerability in Mobatime web application (Documentary proof upload modules) allows a malicious user to Upload a Web Shell to a Web Server.This issue affects Mobatime web application: through 06.7.22.\n\n\n\ud83d\udccf Published: 2023-06-02T12:28:40.384Z\n\ud83d\udccf Modified: 2025-01-08T18:05:05.431Z\n\ud83d\udd17 References:\n1. https://borelenzo.github.io/stuff/2023/06/01/cve-2023-3032.html", "creation_timestamp": "2025-01-08T18:13:46.000000Z"}, {"uuid": "70e73c9b-23a3-4760-9b50-daf5f86cb83c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30323", "type": "seen", "source": "https://t.me/cibsecurity/66122", "content": "\u203c CVE-2023-30323 \u203c\n\nSQL Injection vulnerability in username field in /src/chatbotapp/chatWindow.java in Payatu ChatEngine v.1.0, allows attackers to gain sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T18:33:45.000000Z"}, {"uuid": "3d5d6595-f363-4278-892c-0aa09472ffc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30321", "type": "seen", "source": "https://t.me/cibsecurity/66145", "content": "\u203c CVE-2023-30321 \u203c\n\nCross Site Scripting (XSS) vulnerability in textMessage field in /src/chatbotapp/LoginServlet.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T20:20:34.000000Z"}, {"uuid": "9143fe06-a4ce-4307-9087-e79fad5bab8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30320", "type": "seen", "source": "https://t.me/cibsecurity/66138", "content": "\u203c CVE-2023-30320 \u203c\n\nCross Site Scripting (XSS) vulnerability in textMessage field in /src/chatbotapp/chatWindow.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T20:20:27.000000Z"}, {"uuid": "b9a9f276-e218-4252-8804-88c2c6e28eb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30326", "type": "seen", "source": "https://t.me/cibsecurity/66103", "content": "\u203c CVE-2023-30326 \u203c\n\nCross Site Scripting (XSS) vulnerability in username field in /WebContent/WEB-INF/lib/chatbox.jsp in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T18:30:25.000000Z"}, {"uuid": "69dfd99b-a5f9-43dc-86a7-ba37606b9bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30322", "type": "seen", "source": "https://t.me/cibsecurity/66114", "content": "\u203c CVE-2023-30322 \u203c\n\nCross Site Scripting (XSS) vulnerability in username field in /src/chatbotapp/chatWindow.java in Payatu ChatEngine v.1.0, allows attackers to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T18:33:31.000000Z"}]}