{"vulnerability": "CVE-2023-4223", "sightings": [{"uuid": "aba0a844-4ad5-4521-acad-3f2eabc04b75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42231", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr6lg2uo2f", "content": "", "creation_timestamp": "2025-01-13T22:15:44.469020Z"}, {"uuid": "ba97999a-bf20-44f1-a99b-68f60e68a2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42234", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr6uipqf2h", "content": "", "creation_timestamp": "2025-01-13T22:15:54.139834Z"}, {"uuid": "10ded9e1-23e8-4712-a569-0fd74f638d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42239", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr7eytsr2r", "content": "", "creation_timestamp": "2025-01-13T22:16:11.325266Z"}, {"uuid": "5c3072fe-8120-409f-aba8-3e78d6c256cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42230", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr6jdzdg2r", "content": "", "creation_timestamp": "2025-01-13T22:15:42.512818Z"}, {"uuid": "a443c7f6-d458-4d83-9d1f-a0e2cb641f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42232", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr6ok26f2h", "content": "", "creation_timestamp": "2025-01-13T22:15:47.744778Z"}, {"uuid": "972d7dfa-5060-4b03-bf41-dbcb46332b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42235", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr6yacv52h", "content": "", "creation_timestamp": "2025-01-13T22:15:57.889022Z"}, {"uuid": "20f602b6-005c-48e6-96bc-48615d76cb03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42233", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr6rltz62t", "content": "", "creation_timestamp": "2025-01-13T22:15:51.050840Z"}, {"uuid": "51937b23-fbe8-4aad-81c5-40c71e4d299a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42236", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr73k4k62f", "content": "", "creation_timestamp": "2025-01-13T22:16:01.332688Z"}, {"uuid": "2b57cba0-d8dc-4224-9d23-83ebfe1ec68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42238", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr7caprp2c", "content": "", "creation_timestamp": "2025-01-13T22:16:08.426686Z"}, {"uuid": "217402a1-080e-421e-8aab-8c40563f4651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42237", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr76upx42n", "content": "", "creation_timestamp": "2025-01-13T22:16:04.858644Z"}, {"uuid": "0a093cd3-d39b-4fbb-826d-e92203a57d55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42233", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpeu2d2nu2z", "content": "", "creation_timestamp": "2025-01-14T13:40:25.885541Z"}, {"uuid": "b17f64f5-e8fe-4aa6-98c0-f9621be16d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42239", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgrrxoi2y", "content": "", "creation_timestamp": "2025-01-13T22:38:15.906918Z"}, {"uuid": "c1910151-f60e-4fe7-95c3-faf0dcf8129f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42237", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgs2k3m2q", "content": "", "creation_timestamp": "2025-01-13T22:38:16.964105Z"}, {"uuid": "7d6a8f6d-bf2b-4b4a-b4cb-bc1d2d2ba0b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42238", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgrofz52g", "content": "", "creation_timestamp": "2025-01-13T22:38:15.403793Z"}, {"uuid": "0a22b1c0-aa52-4f63-b80b-ffa9fae390d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42238", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1410", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42238\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_eps.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:56:26.305409\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:09:13.000000Z"}, {"uuid": "b030f3a9-35fe-4c79-9b1b-7850cae957d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4223", "type": "seen", "source": "https://t.me/ctinow/155613", "content": "https://ift.tt/jiRzGPF\nCVE-2023-4223 | Chamilo LMS up to 1.11.24 document.ajax.php unrestricted upload", "creation_timestamp": "2023-12-17T14:42:58.000000Z"}, {"uuid": "91bb430b-b0aa-49da-9d1e-fb95760fb701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42236", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1408", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42236\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /common/ajaxfunction.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:58:23.630450\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:08:57.000000Z"}, {"uuid": "ed28fa1e-6137-41d5-8670-d94dd722a867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42235", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42235\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple parameters of /monitor/s_normalizedtrans.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:59:30.326669\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:08:36.000000Z"}, {"uuid": "0df29fe6-ae89-4570-a415-7a28dc9e81b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42237", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1409", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42237\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple GET parameters of /vam/vam_i_command.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:56:55.654941\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:09:05.000000Z"}, {"uuid": "88cd1d4d-5aab-490e-94e6-5d5d7557f876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42239", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1411", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42239\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_ep.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:55:52.549342\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:09:25.000000Z"}, {"uuid": "10c16505-8805-4fd4-a353-801edfcc5be7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42231", "type": "seen", "source": "https://t.me/cvedetector/15206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42231 - Pat Infinite Solutions HelpdeskAdvanced Convenience Functionality Weakness\", \n  \"Content\": \"CVE ID : CVE-2023-42231 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : Pat Infinite Solutions HelpdeskAdvanced &lt;=\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:42.000000Z"}, {"uuid": "cd634747-82ad-44f3-afdc-633b71320c31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42232", "type": "seen", "source": "https://t.me/cvedetector/15205", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42232 - Pat Infinite Solutions HelpdeskAdvanced PHP Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42232 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : Pat Infinite Solutions HelpdeskAdvanced &lt;=\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:42.000000Z"}, {"uuid": "0c3110d6-e10a-4cae-9f22-fd38446f188f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42238", "type": "seen", "source": "https://t.me/cvedetector/15201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42238 - Selesta Visual Access Manager VAM SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2023-42238 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_eps.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:36.000000Z"}, {"uuid": "4589bb0e-c7f5-401e-937d-e1f77c2a9bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42239", "type": "seen", "source": "https://t.me/cvedetector/15198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42239 - Selesta Visual Access Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42239 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_ep.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:34.000000Z"}]}