{"vulnerability": "CVE-2023-50256", "sightings": [{"uuid": "a56cc0b7-5962-4b3d-ada9-df4ee4222384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50256", "type": "seen", "source": "https://t.me/arpsyndicate/3078", "content": "#ExploitObserverAlert\n\nCVE-2023-50256\n\nDESCRIPTION: Exploit Observer has 4 entries in 4 file formats related to CVE-2023-50256. Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.\n\nFIRST-EPSS: 0.000520000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-26T21:24:26.000000Z"}, {"uuid": "678d81cf-0585-469c-8e64-67361eb9a486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50256", "type": "seen", "source": "https://t.me/cibsecurity/74347", "content": "\u203c\ufe0fCVE-2023-50256\u203c\ufe0f\n\nFroxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements e.g. surname, company name established by the system. Version 2.1.2 fixes this issue. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:38:08.000000Z"}, {"uuid": "76b0a834-f15d-4de9-8c02-f89b95077e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50256", "type": "seen", "source": "https://t.me/ctinow/162698", "content": "https://ift.tt/gpo12RT\nCVE-2023-50256", "creation_timestamp": "2024-01-04T00:32:12.000000Z"}, {"uuid": "5e44af84-c7f6-4af2-9f82-486b6fc51fa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50256", "type": "seen", "source": "https://t.me/ctinow/166198", "content": "https://ift.tt/CbD8F5k\nCVE-2023-50256 Exploit", "creation_timestamp": "2024-01-10T23:16:42.000000Z"}, {"uuid": "bc1c24bd-fc52-4e45-b990-3ef66a55a322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50256", "type": "seen", "source": "https://t.me/arpsyndicate/2470", "content": "#ExploitObserverAlert\n\nCVE-2023-50256\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-50256. Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.", "creation_timestamp": "2024-01-05T12:04:16.000000Z"}]}