{"vulnerability": "CVE-2023-32725", "sightings": [{"uuid": "9cc98c43-d2a4-4c63-833f-393e772d8e5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32725", "type": "seen", "source": "https://t.me/arpsyndicate/2188", "content": "#ExploitObserverAlert\n\nCVE-2023-32725\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32725. The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.\n\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-28T04:07:48.000000Z"}, {"uuid": "581b55d2-c11f-48e7-b975-ff490a1b6921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32725", "type": "seen", "source": "https://t.me/ctinow/167142", "content": "https://ift.tt/ZzaAGuY\nCVE-2023-32725 | Zabbix up to 6.0.21/6.4.6/7.0.0alpha3 Session Cookie cookie validation", "creation_timestamp": "2024-01-12T09:11:43.000000Z"}]}