{"vulnerability": "CVE-2023-3486", "sightings": [{"uuid": "ed36e585-b119-4fdf-8c41-843aa7473aa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34865", "type": "seen", "source": "https://t.me/cibsecurity/65233", "content": "\u203c CVE-2023-34865 \u203c\n\nDirectory traversal vulnerability in ujcms 6.0.2 allows attackers to move files via the rename feature.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-14T18:20:49.000000Z"}, {"uuid": "d74ad5ab-f508-4d94-a559-55ee89ea7406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3486", "type": "seen", "source": "https://t.me/cibsecurity/67233", "content": "\u203c CVE-2023-3486 \u203c\n\nAn authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host\u00e2\u20ac\u2122s file storage. This could exhaust system resources and prevent the service from operating as expected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-25T16:26:49.000000Z"}, {"uuid": "5116b2b1-497c-44a2-9c67-e1cb365884de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34868", "type": "seen", "source": "https://t.me/cibsecurity/65239", "content": "\u203c CVE-2023-34868 \u203c\n\nJerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-14T20:20:54.000000Z"}]}