{"vulnerability": "CVE-2023-4325", "sightings": [{"uuid": "ef82c4ed-26c1-496d-8786-e60251b19cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43256", "type": "seen", "source": "https://t.me/ctinow/161008", "content": "https://ift.tt/THR03sU\nCVE-2023-47440 | Gladys Assistant up to 4.27.0 Incomplete Fix CVE-2023-43256 path traversal", "creation_timestamp": "2023-12-31T08:46:53.000000Z"}, {"uuid": "d336b44f-39cf-423c-885e-dab9e99ad569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43251", "type": "seen", "source": "https://t.me/cibsecurity/72579", "content": "\u203c CVE-2023-43251 \u203c\n\nXNSoft Nconvert 7.136 has an Exception Handler Chain Corrupted via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-19T19:32:04.000000Z"}, {"uuid": "5960d679-5d8e-4fdf-ae73-4f1faa039b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43252", "type": "seen", "source": "https://t.me/cibsecurity/72565", "content": "\u203c CVE-2023-43252 \u203c\n\nXNSoft Nconvert 7.136 is vulnerable to Buffer Overflow via a crafted image file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-19T16:40:38.000000Z"}, {"uuid": "4165f203-f049-4788-ad32-f40a8450a1fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43256", "type": "seen", "source": "https://t.me/cibsecurity/70996", "content": "\u203c CVE-2023-43256 \u203c\n\nA path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-25T18:39:16.000000Z"}, {"uuid": "806979ce-1ad8-4666-8ef4-12bb5e155b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4325", "type": "seen", "source": "https://t.me/cibsecurity/68583", "content": "\u203c CVE-2023-4325 \u203c\n\nBroadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T22:31:03.000000Z"}]}