{"vulnerability": "CVE-2023-4658", "sightings": [{"uuid": "5f3e95e7-055e-45b3-a9ee-0a7507c9c3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46586", "type": "seen", "source": "https://t.me/cvedetector/7432", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-46586 - Weborf CGI Path Truncation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-46586 \nPublished : Oct. 9, 2024, 6:15 a.m. | 32\u00a0minutes ago \nDescription : cgi.c in weborf .0.17, 0.18, 0.19, and 0.20 (before 1.0) lacks '\\0' termination of the path for CGI scripts because strncpy is misused. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T08:57:23.000000Z"}, {"uuid": "6951bafb-7025-4f7f-84be-64058a9ecca0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/ctinow/155664", "content": "https://ift.tt/I0FKkcN\nCVE-2023-46589 | Apache Tomcat up to 8.5.95/9.0.82/10.1.15/11.0.0-M10 HTTP Trailer Header request smuggling", "creation_timestamp": "2023-12-17T20:17:54.000000Z"}, {"uuid": "d0141b93-7605-42e7-a547-7c604f1aeba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/ctinow/182248", "content": "https://ift.tt/cKDx9F1\nCVE-2023-46589 | Oracle MySQL Enterprise Monitor 8.0.36 and prior request smuggling", "creation_timestamp": "2024-02-09T21:32:07.000000Z"}, {"uuid": "6e58f720-d80a-4b5a-8b84-2aae7d3ac733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46583", "type": "seen", "source": "https://t.me/cibsecurity/72929", "content": "\u203c CVE-2023-46583 \u203c\n\nCross-Site Scripting (XSS) vulnerability in PHPGurukul Nipah virus (NiV) \" Testing Management System v.1.0 allows attackers to execute arbitrary code via a crafted payload injected into the State field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-26T06:27:56.000000Z"}, {"uuid": "521ce893-8cc5-481d-b637-1feceb47011a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46584", "type": "seen", "source": "https://t.me/cibsecurity/72927", "content": "\u203c CVE-2023-46584 \u203c\n\nSQL Injection vulnerability in PHPGurukul Nipah virus (NiV) \" Testing Management System v.1.0 allows a remote attacker to escalate privileges via a crafted request to the new-user-testing.php endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-26T02:50:27.000000Z"}, {"uuid": "9c98bad8-b30d-4e57-a3a4-e53eb8edad94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/ctinow/180356", "content": "https://ift.tt/uqaoRKC\nCVE-2023-46589 | Oracle Graph Server and Client Prior to 22.4.6/Prior to 23.4.0 Packaging request smuggling", "creation_timestamp": "2024-02-06T21:46:31.000000Z"}, {"uuid": "f5621cb1-bc09-44e2-ac1d-e118a08729b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/ctinow/180375", "content": "https://ift.tt/iMpgs9l\nCVE-2023-46589 | Oracle Commerce Guided Search 11.3.2 Content Acquisition System input validation", "creation_timestamp": "2024-02-06T22:51:45.000000Z"}, {"uuid": "ee3e63c3-77cf-4cb6-a063-ea7d9cc360b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/ctinow/180290", "content": "https://ift.tt/ObWCa1q\nCVE-2023-46589 | Oracle Big Data Spatial and Graph 3.0.4 Big Data Graph unknown vulnerability", "creation_timestamp": "2024-02-06T20:17:12.000000Z"}, {"uuid": "535a6d3c-e57c-412b-abcb-bcdf443de11f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/ctinow/181038", "content": "https://ift.tt/DiOByok\nCVE-2023-46589 | Oracle Communications Policy Management 12.6.1.0.0/15.0.0.0.0 CMP unknown vulnerability", "creation_timestamp": "2024-02-07T23:56:49.000000Z"}, {"uuid": "11608d02-d280-4e14-ac2b-7db584ecf2e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4658", "type": "seen", "source": "https://t.me/ctinow/157852", "content": "https://ift.tt/EAq28oa\nCVE-2023-4658 | GitLab Enterprise Edition prior 16.4.3/16.5.3/16.6.1 Allowed to Merge access control (Issue 42383)", "creation_timestamp": "2023-12-21T17:42:47.000000Z"}, {"uuid": "ede7ac7e-b5a6-458a-b8cf-212f1148de91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46589", "type": "seen", "source": "https://t.me/LearnExploit/5801", "content": "CVE-2023-46589 Apache Tomcat - Request Smuggling\n\nRead\n\n#CVE #Apache \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-12-23T11:53:39.000000Z"}]}