{"vulnerability": "CVE-2023-3894", "sightings": [{"uuid": "f7925111-41b7-449c-a531-c89fe897354f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38944", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/198540", "content": "https://ift.tt/viRdcz2\nMultilaser Router - Access Control Bypass through Header Manipulation - CVE-2023-38944", "creation_timestamp": "2024-03-03T02:07:19.000000Z"}, {"uuid": "a41d1eab-d9f3-4a61-beec-1825cb80a99c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38945", "type": "seen", "source": "https://t.me/ctinow/200919", "content": "https://ift.tt/3UTO1Z5\nCVE-2023-38945", "creation_timestamp": "2024-03-06T01:26:20.000000Z"}, {"uuid": "beda1243-201c-4204-9ec9-c883b8558df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38946", "type": "seen", "source": "https://t.me/ctinow/200920", "content": "https://ift.tt/5rDfgcz\nCVE-2023-38946", "creation_timestamp": "2024-03-06T01:26:21.000000Z"}, {"uuid": "3b9f1287-7840-489c-a428-0be74ac8a359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38944", "type": "seen", "source": "https://t.me/ctinow/200918", "content": "https://ift.tt/NcxeAXm\nCVE-2023-38944", "creation_timestamp": "2024-03-06T01:26:19.000000Z"}, {"uuid": "aa9a660d-9e80-4ead-b9ad-2eb0e99a28e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38946", "type": "seen", "source": "https://t.me/ctinow/200913", "content": "https://ift.tt/5rDfgcz\nCVE-2023-38946", "creation_timestamp": "2024-03-06T01:26:11.000000Z"}, {"uuid": "42be2335-40eb-4857-82c5-d60ab91455c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38945", "type": "seen", "source": "https://t.me/ctinow/200912", "content": "https://ift.tt/3UTO1Z5\nCVE-2023-38945", "creation_timestamp": "2024-03-06T01:26:10.000000Z"}, {"uuid": "70be0e59-ae4a-477a-ac65-aaab4bb9aba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38944", "type": "seen", "source": "https://t.me/ctinow/200911", "content": "https://ift.tt/NcxeAXm\nCVE-2023-38944", "creation_timestamp": "2024-03-06T01:26:09.000000Z"}, {"uuid": "e80c8d06-e81d-4746-9bd1-50c984981e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38946", "type": "seen", "source": "https://t.me/ctinow/198542", "content": "https://ift.tt/eqBgWxE\nMultilaser Router - Access Control Bypass through Cookie Manipulation - CVE-2023-38946", "creation_timestamp": "2024-03-03T02:07:21.000000Z"}, {"uuid": "b9fe2dc7-ba77-4961-b77e-f5f036a21ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38945", "type": "seen", "source": "https://t.me/ctinow/198541", "content": "https://ift.tt/q8GQHl2\nMultilaser Router - Access Control Bypass through URL Manipulation - CVE-2023-38945", "creation_timestamp": "2024-03-03T02:07:21.000000Z"}, {"uuid": "02ae8b42-fe79-41a9-a4d1-9f0db0d77179", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38941", "type": "seen", "source": "https://t.me/cibsecurity/67734", "content": "\u203c CVE-2023-38941 \u203c\n\ndjango-sspanel v2022.2.2 was discovered to contain a remote command execution (RCE) vulnerability via the component sspanel/admin_view.py -&gt; GoodsCreateView._post.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-04T07:45:29.000000Z"}, {"uuid": "dfef30fa-7d20-410f-8317-c34c380a0216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38940", "type": "seen", "source": "https://t.me/cibsecurity/67908", "content": "\u203c CVE-2023-38940 \u203c\n\nTenda F1203 V2.0.1.6, FH1203 V2.0.1.6 and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T22:18:38.000000Z"}, {"uuid": "370124e0-ba0b-4836-ac7d-8b94c9efdde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38942", "type": "seen", "source": "https://t.me/cibsecurity/67720", "content": "\u203c CVE-2023-38942 \u203c\n\nDango-Translator v4.5.5 was discovered to contain a remote command execution (RCE) vulnerability via the component app/config/cloud_config.json.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T22:40:11.000000Z"}, {"uuid": "0f766090-da95-41a2-a7e7-ded0222459c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38948", "type": "seen", "source": "https://t.me/cibsecurity/67717", "content": "\u203c CVE-2023-38948 \u203c\n\nAn arbitrary file download vulnerability in the /c/PluginsController.php component of jizhi CMS 1.9.5 allows attackers to execute arbitrary code via downloading a crafted plugin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T20:40:14.000000Z"}, {"uuid": "e7c9d019-d400-4ffa-b1f6-7eba2a1d8e09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38947", "type": "seen", "source": "https://t.me/cibsecurity/67715", "content": "\u203c CVE-2023-38947 \u203c\n\nAn arbitrary file upload vulnerability in the /languages/install.php component of WBCE CMS v1.6.1 allows attackers to execute arbitrary code via a crafted PHP file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-03T20:40:12.000000Z"}]}