{"vulnerability": "CVE-2023-3305", "sightings": [{"uuid": "d1ef4550-25fe-462c-b902-77abea6ebcca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-33053", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "a31d9f8c-e15e-4771-a4b0-ceca11c66f5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33057", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15420", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33057\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Transient DOS in Multi-Mode Call Processor while processing UE policy container.\n\ud83d\udccf Published: 2024-02-06T05:47:00.378Z\n\ud83d\udccf Modified: 2025-05-07T20:06:57.138Z\n\ud83d\udd17 References:\n1. https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", "creation_timestamp": "2025-05-07T20:23:02.000000Z"}, {"uuid": "b7c7aa75-aa37-437c-b237-c2c209f90f47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33058", "type": "seen", "source": "https://t.me/ctinow/179786", "content": "https://ift.tt/JSu5QcI\nCVE-2023-33058", "creation_timestamp": "2024-02-06T07:26:31.000000Z"}, {"uuid": "b7017853-822e-4780-9c48-1ba52ef7df0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33058", "type": "seen", "source": "https://t.me/ctinow/196811", "content": "https://ift.tt/AjEh2qP\nCVE-2023-33058 | Qualcomm 4 Gen 2 Mobile Platform Modem information disclosure", "creation_timestamp": "2024-02-29T16:57:07.000000Z"}, {"uuid": "bfe2f75c-731a-4703-ba87-00cb94dabc0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33057", "type": "seen", "source": "https://t.me/ctinow/179785", "content": "https://ift.tt/xSYolnL\nCVE-2023-33057", "creation_timestamp": "2024-02-06T07:26:30.000000Z"}, {"uuid": "e65ba2dd-b738-46ba-8b89-e4e3a7403293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33053", "type": "seen", "source": "https://t.me/ctinow/158821", "content": "https://ift.tt/VbUd7Y1\nCVE-2023-33053 | Qualcomm 8 Gen 1 Mobile Platform Metadata memory corruption", "creation_timestamp": "2023-12-23T14:16:31.000000Z"}, {"uuid": "ecbc2889-92d3-4330-b38a-9e2646b3c61c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33054", "type": "seen", "source": "https://t.me/ctinow/158828", "content": "https://ift.tt/kwpK7yU\nCVE-2023-33054 | Qualcomm 4 Gen 1 Mobile Platform GNSS Assistance Data improper authentication", "creation_timestamp": "2023-12-23T14:41:33.000000Z"}, {"uuid": "693c45da-fdc1-48ce-b4a1-6cf4c57aaa2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3305", "type": "seen", "source": "https://t.me/cibsecurity/65322", "content": "\u203c CVE-2023-3305 \u203c\n\nA vulnerability was found in C-DATA Web Management System up to 20230607. It has been classified as critical. This affects an unknown part of the file /cgi-bin/jumpto.php?class=user&amp;page=config_save&amp;isphp=1 of the component User Creation Handler. The manipulation of the argument user/newpassword leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231801 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-18T12:24:31.000000Z"}]}