{"vulnerability": "CVE-2023-3790", "sightings": [{"uuid": "b5867732-daa4-4259-884d-b7933b2de50e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37908", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwpcbpl4vm2v", "content": "", "creation_timestamp": "2025-08-18T21:02:49.811643Z"}, {"uuid": "30e88cc8-3ea4-4e71-aab4-db36580d8d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5682", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit for CVE-2023-37903 \nURL\uff1ahttps://github.com/7h3h4ckv157/CVE-2023-37903\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-11-05T11:27:39.000000Z"}, {"uuid": "4afd8e24-5aa8-4bfe-8f44-1eeda5c04397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "seen", "source": "https://gist.github.com/abhu85/37e5770c487c142ffc50e5429b6fc363", "content": "", "creation_timestamp": "2026-03-10T16:29:43.000000Z"}, {"uuid": "40149653-d605-4bb5-80a7-c6ef92e2d475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37901", "type": "seen", "source": "https://t.me/cibsecurity/67108", "content": "\u203c CVE-2023-37901 \u203c\n\nIndico is an open source a general-purpose, web based event management tool. There is a Cross-Site-Scripting vulnerability in confirmation prompts commonly used when deleting content from Indico. Exploitation requires someone with at least submission privileges (such as a speaker) and then someone else to attempt to delete this content. Considering that event organizers may want to delete suspicious-looking content when spotting it, there is a non-negligible risk of such an attack to succeed. The risk of this could be further increased when combined with some some social engineering pointing the victim towards this content. Users need to update to Indico 3.2.6 as soon as possible. See the docs for instructions on how to update. Users who cannot upgrade should only let trustworthy users manage categories, create events or upload materials (\"submission\" privileges on a contribution/event). This should already be the case in a properly-configured setup when it comes to category/event management. Note that a conference doing a Call for Abstracts actively invites external speakers (who the organizers may not know and thus cannot fully trust) to submit content, hence the need to update to a a fixed version ASAP in particular when using such workflows.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-21T22:23:42.000000Z"}, {"uuid": "ce3b0c3b-fe9a-4c15-b5b1-07d37210ae79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "published-proof-of-concept", "source": "Telegram/3LR1Wy5rW0nbbFLRmrC8s3vXRwmgCEEKlE2_DCEjQ4Xz6w", "content": "", "creation_timestamp": "2023-11-06T05:43:36.000000Z"}, {"uuid": "a59d2915-ce53-47c3-9822-76f885e739a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3522", "content": "https://github.com/7h3h4ckv157/CVE-2023-37903\n#github #poc", "creation_timestamp": "2023-11-06T11:57:14.000000Z"}, {"uuid": "c7ad8bb1-6035-4cf3-99aa-fec76ee0e84f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37909", "type": "seen", "source": "https://t.me/cibsecurity/72894", "content": "\u203c CVE-2023-37909 \u203c\n\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.1-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This has been patched in XWiki 14.10.8 and 15.3-rc-1 by adding proper escaping. As a workaround, the patch can be manually applied to the document `Menu.UIExtensionSheet`; only three lines need to be changed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:52:50.000000Z"}, {"uuid": "1c71980d-98e0-4248-8c18-ab72e7153ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37908", "type": "seen", "source": "https://t.me/cibsecurity/72850", "content": "\u203c CVE-2023-37908 \u203c\n\nXWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. The cleaning of attributes during XHTML rendering, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid attribute names. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki. When a user moves the mouse over a malicious link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. While this attribute was correctly recognized as not allowed, the attribute was still printed with a prefix `data-xwiki-translated-attribute-` without further cleaning or validation. This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by removing characters not allowed in data attributes and then validating the cleaned attribute again. There are no known workarounds apart from upgrading to a version including the fix.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:45:21.000000Z"}, {"uuid": "bec89eef-1466-4cb3-bc81-d793a4a56cf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3790", "type": "seen", "source": "https://t.me/cibsecurity/67048", "content": "\u203c CVE-2023-3790 \u203c\n\nA vulnerability has been found in Boom CMS 8.0.7 and classified as problematic. Affected by this vulnerability is the function add of the component assets-manager. The manipulation of the argument title/description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235057 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-20T20:32:42.000000Z"}, {"uuid": "25377c94-9e9f-4704-b31e-b085c6006504", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37900", "type": "seen", "source": "https://t.me/cibsecurity/67338", "content": "\u203c CVE-2023-37900 \u203c\n\nCrossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, a high-privileged user could create a Package referencing an arbitrarily large image containing that Crossplane would then parse, possibly resulting in exhausting all the available memory and therefore in the container being OOMKilled. The impact is limited due to the high privileges required to be able to create the Package and the eventually consistency nature of controller. This issue is fixed in versions 1.11.5, 1.12.3, and 1.13.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-27T20:28:46.000000Z"}, {"uuid": "dbf4c452-5c16-4714-b4d4-b992475b1384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37907", "type": "seen", "source": "https://t.me/cibsecurity/67267", "content": "\u203c CVE-2023-37907 \u203c\n\nCryptomator is data encryption software for users who store their files in the cloud. Prior to version 1.9.2, the MSI installer provided on the homepage allows local privilege escalation (LPE) for low privileged users, if already installed. The problem occurs as the repair function of the MSI spawns two administrative CMDs. A simple LPE is possible via a breakout. Version 1.9.2 fixes this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-26T00:27:24.000000Z"}, {"uuid": "4aeaa712-b3f4-4ac5-bfb1-28809ee6feae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37902", "type": "seen", "source": "https://t.me/cibsecurity/67257", "content": "\u203c CVE-2023-37902 \u203c\n\nVyper is a Pythonic programming language that targets the Ethereum Virtual Machine (EVM). Prior to version 0.3.10, the ecrecover precompile does not fill the output buffer if the signature does not verify. However, the ecrecover builtin will still return whatever is at memory location 0. This means that the if the compiler has been convinced to write to the 0 memory location with specially crafted data (generally, this can happen with a hashmap access or immutable read) just before the ecrecover, a signature check might pass on an invalid signature. Version 0.3.10 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-26T00:27:09.000000Z"}, {"uuid": "68131cf4-5468-4049-a9b9-b3852204797f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1442", "content": "https://github.com/7h3h4ckv157/CVE-2023-37903\n#github #poc", "creation_timestamp": "2023-11-06T05:38:09.000000Z"}, {"uuid": "0ab37e25-2294-4df1-a651-cee9752f08c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37906", "type": "seen", "source": "https://t.me/cibsecurity/67390", "content": "\u203c CVE-2023-37906 \u203c\n\nDiscourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a malicious user can edit a post in a topic and cause a DoS with a carefully crafted edit reason. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-28T20:29:30.000000Z"}, {"uuid": "09441f70-9b70-416e-a5df-aebde7a159b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37904", "type": "seen", "source": "https://t.me/cibsecurity/67388", "content": "\u203c CVE-2023-37904 \u203c\n\nDiscourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, more users than permitted could be created from invite links. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. As a workaround, use restrict to email address invites.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-28T20:29:28.000000Z"}, {"uuid": "5b82db29-8f58-44e1-8b57-59e184dbe295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9336", "content": "#exploit\n1. CVE-2023-22518:\nAn Exploitation tool to exploit the confluence server (Improper Authorization)\nhttps://github.com/sanjai-AK47/CVE-2023-22518\n\n2. CVE-2023-46604:\nAchieving a Reverse Shell Exploit for Apache ActiveMQ\nhttps://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ\n\n3. CVE-2023-37903:\nvm2 Sandbox Escape vulnerability\nhttps://github.com/7h3h4ckv157/CVE-2023-37903", "creation_timestamp": "2025-02-04T15:50:46.000000Z"}, {"uuid": "fa6f1cc7-2243-480e-afd7-cb2d281b4362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37903", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1648", "content": "https://github.com/7h3h4ckv157/CVE-2023-37903\n#github #poc", "creation_timestamp": "2024-08-16T08:43:34.000000Z"}]}