{"vulnerability": "CVE-2023-3648", "sightings": [{"uuid": "b2a5774f-e5e1-4760-ada9-fd2ce70c83a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36483", "type": "seen", "source": "https://t.me/ctinow/209351", "content": "https://ift.tt/6fJbvWU\nCVE-2023-36483", "creation_timestamp": "2024-03-16T06:26:15.000000Z"}, {"uuid": "a0ed6dd0-4eb2-4258-afe4-859a2e81aeb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36480", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/874", "content": "CVE-2023-36480 : Aerospike Java Client 6.1.7 |version| - Remote Code Execution (RCE) \nGHSL : https://github.com/aerospike/aerospike-client-java/security/advisories/GHSA-jj95-55cr-9597", "creation_timestamp": "2023-08-28T22:47:09.000000Z"}, {"uuid": "c9e333ee-74a1-49d8-ae69-23b7766528cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36483", "type": "seen", "source": "https://t.me/ctinow/209355", "content": "https://ift.tt/6fJbvWU\nCVE-2023-36483", "creation_timestamp": "2024-03-16T06:26:18.000000Z"}, {"uuid": "f52dc7a9-9d63-4b60-8b1e-d7ed9254dc30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36486", "type": "seen", "source": "https://t.me/ctinow/159172", "content": "https://ift.tt/JCepyIq\nCVE-2023-36486", "creation_timestamp": "2023-12-25T09:31:18.000000Z"}, {"uuid": "cd82747a-41fc-4858-91f7-d1183a2fd143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36486", "type": "seen", "source": "https://t.me/ctinow/170087", "content": "https://ift.tt/erN8Zjt\nCVE-2023-36486 | ILIAS up to 7.22/8.2 workflow-engine behavioral workflow", "creation_timestamp": "2024-01-19T08:11:47.000000Z"}, {"uuid": "43dc8a9f-5a34-43df-ba48-5c77f3ffac86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36485", "type": "seen", "source": "https://t.me/ctinow/159171", "content": "https://ift.tt/hgnsaT9\nCVE-2023-36485", "creation_timestamp": "2023-12-25T09:31:17.000000Z"}, {"uuid": "3c7cd4f4-827a-4f46-bcc4-4d22c157afd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36480", "type": "seen", "source": "https://t.me/cibsecurity/67761", "content": "\u203c CVE-2023-36480 \u203c\n\nThe Aerospike Java client is a Java application that implements a network protocol to communicate with an Aerospike server. Prior to version 7.0.0, some of the messages received from the server contain Java objects that the client deserializes when it encounters them without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running on. Version 7.0.0 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-04T18:42:15.000000Z"}, {"uuid": "aca5fdd3-38e0-4ff1-a955-5dffe7d1d81d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36489", "type": "seen", "source": "https://t.me/cibsecurity/69992", "content": "\u203c CVE-2023-36489 \u203c\n\nMultiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC firmware versions prior to 'TL-WR902AC(JP)_V3_230506'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T14:17:59.000000Z"}, {"uuid": "0ef977fa-b431-482d-bb36-9ae050c92768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36481", "type": "seen", "source": "https://t.me/cibsecurity/69282", "content": "\u203c CVE-2023-36481 \u203c\n\nAn issue was discovered in Samsung Exynos Mobile Processor and Wearable Processor 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, and W920. Improper handling of PPP length parameter inconsistency can cause an infinite loop.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-28T16:16:44.000000Z"}, {"uuid": "3c929f68-3cea-40c3-9a59-c2b1c0b37de0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36482", "type": "seen", "source": "https://t.me/cibsecurity/68067", "content": "\u203c CVE-2023-36482 \u203c\n\nAn issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-09T00:14:22.000000Z"}, {"uuid": "c0cc5171-b7dc-477d-ac1d-964a7b81ef0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36487", "type": "seen", "source": "https://t.me/cibsecurity/65734", "content": "\u203c CVE-2023-36487 \u203c\n\nThe password reset function in ILIAS 7.0_beta1 through 7.20 and 8.0_beta1 through 8.1 allows remote attackers to take over the account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T20:14:27.000000Z"}, {"uuid": "55ed80a0-c587-44b9-a231-15cac246e3c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36488", "type": "seen", "source": "https://t.me/cibsecurity/65741", "content": "\u203c CVE-2023-36488 \u203c\n\nILIAS 7.21 allows stored Cross Site Scripting (XSS).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T20:14:38.000000Z"}]}