{"vulnerability": "CVE-2023-3276", "sightings": [{"uuid": "e84a0e91-5d26-4b1d-b6ec-c1a8b2d66708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32767", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2572", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32767\n\ud83d\udd39 Description: The web interface of Symcon IP-Symcon before 6.3 (i.e., before 2023-05-12) allows a remote attacker to read sensitive files via .. directory-traversal sequences in the URL.\n\ud83d\udccf Published: 2023-05-17T00:00:00\n\ud83d\udccf Modified: 2025-01-22T16:56:30.760Z\n\ud83d\udd17 References:\n1. https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-014.txt\n2. https://community.symcon.de/t/ip-symcon-6-3-stable-changelog/40276/87", "creation_timestamp": "2025-01-22T17:01:42.000000Z"}, {"uuid": "c182d70f-1a59-4caf-aa72-02bbf32b084f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32762", "type": "seen", "source": "https://gist.github.com/Darkcrai86/db9b6665c56b50a69b4fc1f0e15c6d63", "content": "", "creation_timestamp": "2025-09-29T07:58:15.000000Z"}, {"uuid": "086ae326-199d-4d18-8caa-0c1aa5a107a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32763", "type": "seen", "source": "https://gist.github.com/jakirkham/b16b96bb6b20b7a5405e686931fd28cd", "content": "", "creation_timestamp": "2026-01-14T19:38:38.000000Z"}, {"uuid": "f0ce20e1-6318-40c3-b074-b35c8301acae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32762", "type": "seen", "source": "https://gist.github.com/jakirkham/b16b96bb6b20b7a5405e686931fd28cd", "content": "", "creation_timestamp": "2026-01-14T19:38:38.000000Z"}, {"uuid": "402670d0-90f0-46ee-93c2-6ef9c705b6d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32764", "type": "seen", "source": "https://t.me/cibsecurity/67722", "content": "\u203c CVE-2023-32764 \u203c\n\nFabasoft Cloud Enterprise Client 23.3.0.130 allows a user to escalate their privileges to local administrator.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T22:40:13.000000Z"}, {"uuid": "7a177a85-9460-40ca-82ae-e823bc667907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32763", "type": "seen", "source": "https://t.me/cibsecurity/64754", "content": "\u203c CVE-2023-32763 \u203c\n\nAn issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T13:44:50.000000Z"}, {"uuid": "b6af8882-035c-4af6-b258-73817a0d2cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32760", "type": "seen", "source": "https://t.me/cibsecurity/66759", "content": "\u203c CVE-2023-32760 \u203c\n\nAn issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via API calls related to data feeds and data publication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T22:22:49.000000Z"}, {"uuid": "c0926c0a-f7c7-4410-83ef-6e87e72e30c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32761", "type": "seen", "source": "https://t.me/cibsecurity/66743", "content": "\u203c CVE-2023-32761 \u203c\n\nCross Site Request Forgery (CSRF) vulnerability in Archer Platform before v.6.13 and fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to execute arbitrary code via a crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T22:22:29.000000Z"}, {"uuid": "fcfa195a-01a0-4735-8452-cd5e23229dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32767", "type": "seen", "source": "https://t.me/cibsecurity/64352", "content": "\u203c CVE-2023-32767 \u203c\n\nThe web interface of Symcon IP-Symcon before 6.3 (i.e., before 2023-05-12) allows a remote attacker to read sensitive files via .. directory-traversal sequences in the URL.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T00:36:34.000000Z"}]}