{"vulnerability": "CVE-2023-38693", "sightings": [{"uuid": "4ed22e35-e082-4a52-8d42-52129942796d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38693", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "7d549b31-8583-4011-8d91-a4659aceb684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38693", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lk33x7nlas2i", "content": "", "creation_timestamp": "2025-03-11T03:13:52.215188Z"}, {"uuid": "4a8c56ca-f24b-4be1-9574-c4065a13be2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38693", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljpgzv3e7f2u", "content": "", "creation_timestamp": "2025-03-06T12:00:34.873418Z"}, {"uuid": "d3337a14-b776-441f-9019-4d86c0cad47b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38693", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-38693\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173.\n\ud83d\udccf Published: 2025-03-05T15:37:55.847Z\n\ud83d\udccf Modified: 2025-03-06T21:58:44.944Z\n\ud83d\udd17 References:\n1. https://github.com/lucee/Lucee/security/advisories/GHSA-vwjx-mmwm-pwrf", "creation_timestamp": "2025-03-06T22:33:45.000000Z"}, {"uuid": "49fd3674-8a84-4a35-88d1-e7d60cfd4e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38693", "type": "seen", "source": "https://t.me/cvedetector/19643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-38693 - Lucee Server XXE Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-38693 \nPublished : March 5, 2025, 4:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T18:37:05.000000Z"}]}