{"vulnerability": "CVE-2023-3260", "sightings": [{"uuid": "7608c681-00fd-4c2a-9837-c8b6544d686c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32601", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646460074259326", "content": "", "creation_timestamp": "2024-12-13T16:29:23.062671Z"}, {"uuid": "cbf7468a-7348-40cf-8ded-50775f993c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3260", "type": "seen", "source": "https://gist.github.com/epappas/bc55d25e0ca495ef04a5ef5e6a9c8c16", "content": "", "creation_timestamp": "2026-01-31T20:58:58.000000Z"}, {"uuid": "b83f1219-60b6-4e7b-8c58-b729bb116b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32609", "type": "seen", "source": "https://t.me/cibsecurity/68283", "content": "\u203c CVE-2023-32609 \u203c\n\nImproper access control in the Intel Unite(R) android application before version 4.2.3504 may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:26:41.000000Z"}, {"uuid": "8525114d-7fdd-4329-948f-d5af4ddd6e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32604", "type": "seen", "source": "https://t.me/cibsecurity/65564", "content": "\u203c CVE-2023-32604 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32605.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:27:54.000000Z"}, {"uuid": "72497bb1-b232-4c28-a924-1504bac635a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3260", "type": "seen", "source": "https://t.me/cibsecurity/68414", "content": "\u203c CVE-2023-3260 \u203c\n\nThe Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to command injection via the `user-name` URL parameter.An authenticated malicious agent can exploit this vulnerability to execute arbitrary command on the underlying Linux operating system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-14T07:19:03.000000Z"}, {"uuid": "4bfac279-7165-40a5-9ec7-3cea541bc9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32605", "type": "seen", "source": "https://t.me/cibsecurity/65564", "content": "\u203c CVE-2023-32604 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32605.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:27:54.000000Z"}, {"uuid": "e1d6b781-69d5-42a2-a79c-45a7ca777396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32605", "type": "seen", "source": "https://t.me/cibsecurity/65536", "content": "\u203c CVE-2023-32605 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32604.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:21:51.000000Z"}, {"uuid": "bfc7c21d-2794-41d0-a181-0a374a798742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32604", "type": "seen", "source": "https://t.me/cibsecurity/65536", "content": "\u203c CVE-2023-32605 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32604.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:21:51.000000Z"}]}