{"vulnerability": "CVE-2023-3782", "sightings": [{"uuid": "b7f8307e-df1a-4158-bc55-8510654810f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37822", "type": "seen", "source": "https://t.me/cvedetector/6919", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-37822 - Eufy HomeBase 2 wireless WPA2-PSK Protocol Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-37822 \nPublished : Oct. 3, 2024, 6:15 p.m. | 27\u00a0minutes ago \nDescription : Eufy HomeBase 2 model T8010X v3.2.8.3h was discovered to use the deprecated wireless protocol WPA2-PSK. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T20:48:04.000000Z"}, {"uuid": "e70d4a25-ac94-476a-adb2-922496f679a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37824", "type": "seen", "source": "https://t.me/cibsecurity/72718", "content": "\u203c CVE-2023-37824 \u203c\n\nSitolog sitologapplicationconnect v7.8.a and before was discovered to contain a SQL injection vulnerability via the component /activate_hook.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-21T01:43:29.000000Z"}, {"uuid": "281ff920-da22-420c-9dcb-350fb36ccdea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37829", "type": "seen", "source": "https://t.me/cibsecurity/69650", "content": "\u203c CVE-2023-37829 \u203c\n\nA cross-site scripting (XSS) vulnerability in General Solutions Steiner GmbH CASE 3 Taskmanagement V 3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the notification.message parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-01T16:15:10.000000Z"}, {"uuid": "9d8f63dd-0b57-4689-972f-928a22aa23f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37827", "type": "seen", "source": "https://t.me/cibsecurity/69639", "content": "\u203c CVE-2023-37827 \u203c\n\nA cross-site scripting (XSS) vulnerability in General Solutions Steiner GmbH CASE 3 Taskmanagement V 3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the executionBlockName parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-01T16:14:58.000000Z"}, {"uuid": "0c4f3f65-4fcc-4807-bfd1-302f8c4c4f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37826", "type": "seen", "source": "https://t.me/cibsecurity/69648", "content": "\u203c CVE-2023-37826 \u203c\n\nA cross-site scripting (XSS) vulnerability in General Solutions Steiner GmbH CASE 3 Taskmanagement V 3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fieldname parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-01T16:15:08.000000Z"}, {"uuid": "baec6e4b-c28e-4d45-888e-0dee0df01621", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37828", "type": "seen", "source": "https://t.me/cibsecurity/69642", "content": "\u203c CVE-2023-37828 \u203c\n\nA cross-site scripting (XSS) vulnerability in General Solutions Steiner GmbH CASE 3 Taskmanagement V 3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tasktyp parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-01T16:15:01.000000Z"}]}