{"vulnerability": "CVE-2023-33568", "sightings": [{"uuid": "d693ca46-0c96-4cf6-8c95-91f7ff2b6f6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33568", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "e02138d3-e92e-469e-8d3d-abe0f483a8dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33568", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/dolibarr_16_contact_dump.rb", "content": "", "creation_timestamp": "2023-05-30T15:27:30.000000Z"}, {"uuid": "462c2c20-53cd-4e93-94fc-93b1c16ac27c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33568", "type": "published-proof-of-concept", "source": "https://t.me/arvinclub1/387", "content": "CVE-2023-33568 Dolibarr Unauthenticated Contacts Database\n\n{{BaseURL}}/public/ticket/ajax/ajax.php?action=getContacts&amp;email=%\nhttps://github.com/projectdiscovery/nuclei-templates/pull/7488/files", "creation_timestamp": "2023-06-20T08:10:54.000000Z"}, {"uuid": "63288783-a337-43be-a4da-5d4378c4a7ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33568", "type": "seen", "source": "https://t.me/cibsecurity/65161", "content": "\u203c CVE-2023-33568 \u203c\n\nAn issue in Dolibarr v16.0.0 to v16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-13T18:15:40.000000Z"}]}