{"vulnerability": "CVE-2023-4400", "sightings": [{"uuid": "23543852-4176-406a-8721-a5b7fce4e76d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44001", "type": "seen", "source": "https://t.me/arpsyndicate/3081", "content": "#ExploitObserverAlert\n\nCVE-2023-44001\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44001. An issue in Ailand clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T21:43:22.000000Z"}, {"uuid": "74e3335d-a85f-4395-8358-550c85a14f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44001", "type": "seen", "source": "https://t.me/ctinow/174534", "content": "https://ift.tt/2deACKu\nCVE-2023-44001 Exploit", "creation_timestamp": "2024-01-26T23:16:37.000000Z"}, {"uuid": "9cba460c-8d1a-4d02-90f7-764ede767cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44000", "type": "seen", "source": "https://t.me/arpsyndicate/3063", "content": "#ExploitObserverAlert\n\nCVE-2023-44000\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44000. An issue in Otakara lapis totuka mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.", "creation_timestamp": "2024-01-26T20:35:18.000000Z"}, {"uuid": "4c83d786-9916-4c9d-8688-096422d7f042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44008", "type": "seen", "source": "https://t.me/cibsecurity/71436", "content": "\u203c CVE-2023-44008 \u203c\n\nFile Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the File Manager function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T00:40:46.000000Z"}, {"uuid": "b0a51909-83b4-4936-beeb-9c217346735d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44009", "type": "seen", "source": "https://t.me/cibsecurity/71432", "content": "\u203c CVE-2023-44009 \u203c\n\nFile Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the Skin Management function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T00:40:42.000000Z"}, {"uuid": "6f53de1b-cc1a-4952-988d-270bd385e556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44001", "type": "seen", "source": "https://t.me/ctinow/187052", "content": "https://ift.tt/6GAQqzl\nCVE-2023-44001 | Ailand Clinic mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T21:21:41.000000Z"}, {"uuid": "5fae0154-033b-4d6b-b6b3-53e1ae191bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44000", "type": "seen", "source": "https://t.me/ctinow/187051", "content": "https://ift.tt/OydZkXm\nCVE-2023-44000 | Otakara lapis totuka mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-17T21:21:39.000000Z"}, {"uuid": "a0453b92-138d-4f6a-bf31-d95a195d9bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4400", "type": "seen", "source": "https://t.me/cibsecurity/70371", "content": "\u203c CVE-2023-4400 \u203c\n\nA password management vulnerability in Skyhigh Secure Web Gateway (SWG) in main releases 11.x prior to 11.2.14, 10.x prior to 10.2.25 and controlled release 12.x prior to 12.2.1, allows some authentication information stored in configuration files to be extracted through SWG REST API. This was possible due to SWG storing the password in plain text in some configuration files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T12:34:53.000000Z"}, {"uuid": "788333b8-9a4b-4fb2-92a2-a829cbeb06b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44000", "type": "seen", "source": "https://t.me/ctinow/174678", "content": "https://ift.tt/uhIQRDp\nCVE-2023-44000 Exploit", "creation_timestamp": "2024-01-27T08:16:32.000000Z"}, {"uuid": "5269ca06-77aa-43aa-9d74-7b3918d8af2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44001", "type": "seen", "source": "https://t.me/ctinow/172685", "content": "https://ift.tt/MmznPjC\nCVE-2023-44001", "creation_timestamp": "2024-01-24T11:26:23.000000Z"}, {"uuid": "271e2998-9e7c-47b1-a9f0-a454bc57434a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44000", "type": "seen", "source": "https://t.me/ctinow/172684", "content": "https://ift.tt/YkMJZgf\nCVE-2023-44000", "creation_timestamp": "2024-01-24T11:26:22.000000Z"}]}