{"vulnerability": "CVE-2023-47298", "sightings": [{"uuid": "6c3d2b2e-e5d8-486b-97b8-1133c9cb93c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47298", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsbyrqhj5u2p", "content": "", "creation_timestamp": "2025-06-23T16:27:19.243614Z"}, {"uuid": "a67f27a6-8953-41aa-ada3-db086f3a4d99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47298", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19205", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47298\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in NCR Terminal Handler 1.5.1 allows a low-level privileged authenticated attacker to query the SOAP API endpoint to obtain information about all of the users of the application including their usernames, roles, security groups and account statuses.\n\ud83d\udccf Published: 2025-06-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-23T14:32:34.020Z\n\ud83d\udd17 References:\n1. https://drive.google.com/file/d/1-BDd0ycuYhuxo-lg4th-Cswimoqqzkot/view?usp=sharing\n2. https://github.com/pwahba/cve-research/blob/main/CVE-2023-47298/CVE-2023-47298.md", "creation_timestamp": "2025-06-23T14:45:27.000000Z"}]}