{"vulnerability": "CVE-2023-5074", "sightings": [{"uuid": "4332fe22-f2a2-46f3-8b7b-fe1cb2f593a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-27)", "content": "", "creation_timestamp": "2025-03-27T00:00:00.000000Z"}, {"uuid": "fed7eae6-8423-463f-a374-fd93525cfebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-17)", "content": "", "creation_timestamp": "2025-12-17T00:00:00.000000Z"}, {"uuid": "b7ffeaf0-b88d-4bd7-a115-00a2e63a66a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50743", "type": "seen", "source": "https://t.me/cibsecurity/74414", "content": "\u203c\ufe0fCVE-2023-50743\u203c\ufe0f\n\nOnline Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the registration.php resource does not validate the characters received and they are sent unfiltered to the database.   \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-05T01:33:54.000000Z"}, {"uuid": "f8a475a5-3628-4784-b4e4-cdba349ca5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "published-proof-of-concept", "source": "Telegram/s2D4r3HcItMG-UX6ktYGtY57fmA6Pu7uag3qTJuUxALR", "content": "", "creation_timestamp": "2023-10-22T23:43:48.000000Z"}, {"uuid": "f3b2e509-0d0f-4c92-81a1-dd31ac7a612d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50743", "type": "seen", "source": "https://t.me/arpsyndicate/2548", "content": "#ExploitObserverAlert\n\nCVE-2023-50743\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-50743. Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the registration.php resource does not validate the characters received and they are sent unfiltered to the database.\n\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-06T14:55:39.000000Z"}, {"uuid": "e04541e7-6e3e-444e-9597-4a8b4b3767ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1195", "content": "", "creation_timestamp": "2023-09-30T02:04:21.000000Z"}, {"uuid": "afb24a79-19a8-4bc3-99fc-cc0518ea92a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50740", "type": "seen", "source": "https://t.me/ctinow/201436", "content": "https://ift.tt/MxGF62h\nCVE-2023-50740", "creation_timestamp": "2024-03-06T15:31:34.000000Z"}, {"uuid": "0678205c-98c5-44b3-9d33-174f2463bd7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50740", "type": "seen", "source": "https://t.me/ctinow/201430", "content": "https://ift.tt/MxGF62h\nCVE-2023-50740", "creation_timestamp": "2024-03-06T15:26:24.000000Z"}, {"uuid": "fa9007da-4b58-47bf-ab78-fcb97e85fe68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "seen", "source": "https://t.me/cibsecurity/70807", "content": "\u203c CVE-2023-5074 \u203c\n\nUse of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T20:30:18.000000Z"}, {"uuid": "5bc7b07b-ac5b-4294-9baf-03ca52c6667b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50743", "type": "seen", "source": "https://t.me/ctinow/163045", "content": "https://ift.tt/5VXa64N\nCVE-2023-50743", "creation_timestamp": "2024-01-04T15:21:46.000000Z"}, {"uuid": "ab475f89-1cb8-451b-81f4-68edac757bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9121", "content": "#exploit\n1. CVE-2023-5074:\nD-Link D-View Authentication Bypass\nhttps://github.com/codeb0ss/CVE-2023-5074-PoC\n\n2. CVE-2023-38139:\nWindows Kernel Refcount Overflow/UaF\nhttps://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html", "creation_timestamp": "2023-10-01T12:50:40.000000Z"}, {"uuid": "0cb7bcec-76d1-49f0-b9da-46f132df1aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5074", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1218", "content": "#exploit\n1. CVE-2023-5074:\nD-Link D-View Authentication Bypass\nhttps://github.com/codeb0ss/CVE-2023-5074-PoC\n\n2. CVE-2023-38139:\nWindows Kernel Refcount Overflow/UaF\nhttps://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html", "creation_timestamp": "2024-08-16T08:30:30.000000Z"}]}