{"vulnerability": "CVE-2023-4224", "sightings": [{"uuid": "1f5d9f65-a9e9-4e07-9e6f-d38c63dfa824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42249", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfph3pqyrs2e", "content": "", "creation_timestamp": "2025-01-14T14:20:30.532708Z"}, {"uuid": "b6f458db-436d-4627-a322-17441f34d224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42249", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823254108073142", "content": "", "creation_timestamp": "2025-01-13T21:50:25.351940Z"}, {"uuid": "780e3644-babe-4e7d-8133-f99acb4d7751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42241", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823275977111609", "content": "", "creation_timestamp": "2025-01-13T21:55:59.152474Z"}, {"uuid": "0f4208bb-b2d8-44d6-a8a9-eafa574757ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42242", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823275991993622", "content": "", "creation_timestamp": "2025-01-13T21:55:59.452790Z"}, {"uuid": "c3531338-531d-41c7-a864-befe98b433c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42243", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823276005744511", "content": "", "creation_timestamp": "2025-01-13T21:55:59.582430Z"}, {"uuid": "7788a6df-be8e-4e23-97c8-c40b5755a8dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42244", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823276021085212", "content": "", "creation_timestamp": "2025-01-13T21:55:59.705537Z"}, {"uuid": "6671478e-4f95-4e77-88d3-18c78bd3ced0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42245", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823335022827665", "content": "", "creation_timestamp": "2025-01-13T22:10:59.959976Z"}, {"uuid": "e708b654-fa74-476c-93e6-7fa0716b99b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42247", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823335053783592", "content": "", "creation_timestamp": "2025-01-13T22:11:00.597794Z"}, {"uuid": "f7ddd763-08f5-4b8a-b997-a6bc8ad38a3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42246", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823335037954990", "content": "", "creation_timestamp": "2025-01-13T22:11:00.510580Z"}, {"uuid": "551ff04a-c7a2-4fac-88f4-8809f669d51a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42248", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823335068014553", "content": "", "creation_timestamp": "2025-01-13T22:11:01.235369Z"}, {"uuid": "182bbcff-a67e-48e8-b0c5-5a2b355f7184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42240", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr7izwsp2n", "content": "", "creation_timestamp": "2025-01-13T22:16:15.544437Z"}, {"uuid": "db7bd828-6ed0-4a4b-8d7e-5199598c0e45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42241", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr7mqb362t", "content": "", "creation_timestamp": "2025-01-13T22:16:19.447159Z"}, {"uuid": "ae097486-c90d-41a7-8a30-3411bff014b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42242", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnr7rkhng2t", "content": "", "creation_timestamp": "2025-01-13T22:16:24.433883Z"}, {"uuid": "53884d46-de0f-4e8d-bb0a-b9b8893a2a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42249", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnrb2j2e42n", "content": "", "creation_timestamp": "2025-01-13T22:17:07.427954Z"}, {"uuid": "8449d131-1824-4578-a5ad-def89344bbc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42243", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnra3pfad2t", "content": "", "creation_timestamp": "2025-01-13T22:16:35.418530Z"}, {"uuid": "f659a57a-7bb9-480f-82df-bb8614554be0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42244", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnrajlrtf2j", "content": "", "creation_timestamp": "2025-01-13T22:16:49.847260Z"}, {"uuid": "80450e34-d536-4221-8e3a-53b1e4a1c478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42245", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnramdt5o2f", "content": "", "creation_timestamp": "2025-01-13T22:16:52.765365Z"}, {"uuid": "de61531a-02bd-48b5-b9b1-7e05ab13ab27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42246", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnrash5wj2s", "content": "", "creation_timestamp": "2025-01-13T22:16:58.961708Z"}, {"uuid": "4eef4d81-8275-4223-b257-2714d502d551", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42247", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnrauqxjf2j", "content": "", "creation_timestamp": "2025-01-13T22:17:01.370516Z"}, {"uuid": "00d04cb7-bf39-4489-a3eb-86f3c32af6ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42248", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnraxnnh32t", "content": "", "creation_timestamp": "2025-01-13T22:17:04.381084Z"}, {"uuid": "77b5db61-300e-4b52-82d3-3791f869db7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42249", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgqm6kt25", "content": "", "creation_timestamp": "2025-01-13T22:38:12.145204Z"}, {"uuid": "bfe72113-20f7-4e5e-9755-2aa8ae2daadd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42248", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgqyuge2q", "content": "", "creation_timestamp": "2025-01-13T22:38:12.788906Z"}, {"uuid": "9ca8423d-215f-4f79-a7ac-b15622e57daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42246", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgrl2xu2q", "content": "", "creation_timestamp": "2025-01-13T22:38:14.882766Z"}, {"uuid": "10b9423d-78a4-4a06-9f08-42fabe30e368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42247", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgs7mts2e", "content": "", "creation_timestamp": "2025-01-13T22:38:17.493367Z"}, {"uuid": "c5db0626-496a-414c-a3e5-c5863d921dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42244", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgrh6uc2k", "content": "", "creation_timestamp": "2025-01-13T22:38:14.359749Z"}, {"uuid": "241eb34d-6342-4435-99ba-aff8fb1011cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42241", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgrw7ga2y", "content": "", "creation_timestamp": "2025-01-13T22:38:16.420446Z"}, {"uuid": "ab15a05a-096c-478b-b180-bc004478ea38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42240", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgscxil25", "content": "", "creation_timestamp": "2025-01-13T22:38:17.992015Z"}, {"uuid": "e5169a06-f9e6-4a8c-9c60-fda72e5e9450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42241", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpg3kui7n2p", "content": "", "creation_timestamp": "2025-01-14T14:02:31.577880Z"}, {"uuid": "045aae5f-15d6-4336-a6a3-799cc37c6e91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42242", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1414", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42242\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /monitor/s_terminal.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:53:48.975332\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:09:46.000000Z"}, {"uuid": "b0d14000-7bfa-4f56-87dc-c779667399aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42248", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1417", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42248\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page \"common/vam_Sql.php\".\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:49:05.357934\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:10:16.000000Z"}, {"uuid": "cdb41cf3-f829-4966-bede-eb62bdb88b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42244", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1415", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42244\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_visits.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:52:37.434019\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:09:53.000000Z"}, {"uuid": "da21eeda-c8d5-4ad2-b8d3-367d3b9bf5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42241", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1413", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42241\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_anagraphic.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:54:17.541570\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", "creation_timestamp": "2025-01-13T22:09:44.000000Z"}, {"uuid": "a35b3e33-ff1e-4734-b692-c06635787b8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42240", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1412", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42240\n\ud83d\udd39 Description: An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /monitor/s_scheduledfile.php.\n\ud83d\udccf Published: 2025-01-13T00:00:00\n\ud83d\udccf Modified: 2025-01-13T21:55:01.628892\n\ud83d\udd17 References:\n1. https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md/", "creation_timestamp": "2025-01-13T22:09:31.000000Z"}, {"uuid": "8bb6dc82-dd76-4ddf-b181-db37b763076f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42244", "type": "seen", "source": "https://t.me/cvedetector/15202", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42244 - Selesta Visual Access Manager VAM SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2023-42244 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_visits.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:39.000000Z"}, {"uuid": "5fa978ed-97a0-4a5a-98a1-cb645736eedd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42246", "type": "seen", "source": "https://t.me/cvedetector/15195", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42246 - Selesta Visual Access Manager Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42246 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : Selesta Visual Access Manager &lt; 4.42.2 is vulnerable to Cross Site Scripting (XSS) via /vam/vam_ep.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:28.000000Z"}, {"uuid": "88758544-3e08-4778-b8d9-c828b607c902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42245", "type": "seen", "source": "https://t.me/cvedetector/15203", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42245 - Selesta Visual Access Manager Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2023-42245 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : Selesta Visual Access Manager &lt; 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_scheduledfile.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:40.000000Z"}, {"uuid": "463c1d35-1505-4bed-9cd3-6de8c6fdd529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42243", "type": "seen", "source": "https://t.me/cvedetector/15204", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42243 - Selesta Visual Access Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42243 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : In Selesta Visual Access Manager &lt; 4.42.2, an authenticated user can access the administrative page /common/vam_Sql.php, which allows for arbitrary SQL queries. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:41.000000Z"}, {"uuid": "831e0f22-1c7f-4bb9-a15c-d80e18300152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42242", "type": "seen", "source": "https://t.me/cvedetector/15200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42242 - Selesta Visual Access Manager (VAM) SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42242 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /monitor/s_terminal.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:35.000000Z"}, {"uuid": "42ee2e6e-5ed1-45bb-9c92-a1b1983c8350", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42241", "type": "seen", "source": "https://t.me/cvedetector/15199", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42241 - Selesta Visual Access Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42241 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_anagraphic.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:34.000000Z"}, {"uuid": "4f36eff7-78d1-43d7-8976-ba5142381afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42240", "type": "seen", "source": "https://t.me/cvedetector/15197", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42240 - Selesta Visual Access Manager (VAM) SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42240 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /monitor/s_scheduledfile.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:33.000000Z"}, {"uuid": "3c865c0f-fa0b-4980-a587-f1d024ae7ff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42247", "type": "seen", "source": "https://t.me/cvedetector/15196", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42247 - Selesta Visual Access Manager XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42247 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : Selesta Visual Access Manager &lt; 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_monitor_map.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:29.000000Z"}, {"uuid": "b338cd37-dfa2-499f-b9ef-4fd7d9685924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42249", "type": "seen", "source": "https://t.me/cvedetector/15191", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42249 - Selesta Visual Access Manager Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42249 \nPublished : Jan. 13, 2025, 10:15 p.m. | 25\u00a0minutes ago \nDescription : Selesta Visual Access Manager &lt; 4.42.2 is vulnerable to Cross Site Scripting (XSS) via vam/vam_visits.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T23:46:23.000000Z"}, {"uuid": "f787ba9f-f091-40c1-864f-e8b7fde0009f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4224", "type": "seen", "source": "https://t.me/ctinow/155631", "content": "https://ift.tt/LEMD2wq\nCVE-2023-4224 | Chamilo LMS up to 1.11.24 dropbox.ajax.php unrestricted upload", "creation_timestamp": "2023-12-17T16:17:38.000000Z"}, {"uuid": "9775027b-540f-4668-9e9e-ad5e20fc564b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42248", "type": "seen", "source": "Telegram/J-mWE7ns37uTInAOfaHH_WoWz57N4qFs46P5Ou6xJfRC9ICx", "content": "", "creation_timestamp": "2025-02-01T17:28:11.000000Z"}]}