{"vulnerability": "CVE-2023-5078", "sightings": [{"uuid": "d74716fd-4011-455d-820b-79736c2c9ce8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-50782", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "7e07c3c0-5948-4530-ac80-8d63aa37567f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50786", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lt6zoa53zj2a", "content": "", "creation_timestamp": "2025-07-05T05:30:26.281171Z"}, {"uuid": "17db34c2-6c09-4f04-b0cb-4ca8d94a936f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50780", "type": "seen", "source": "https://t.me/cvedetector/7822", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-50780 - Apache ActiveMQ Artemis Log4J2 MBean File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-50780 \nPublished : Oct. 14, 2024, 4:15 p.m. | 37\u00a0minutes ago \nDescription : Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.  \n  \n  \nUsers are recommended to upgrade to version 2.29.0 or later, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T19:10:57.000000Z"}, {"uuid": "d956b6ca-a1ef-4e86-bac1-fce1484d5cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50785", "type": "seen", "source": "https://t.me/ctinow/173408", "content": "https://ift.tt/7qYzt8M\nCVE-2023-50785 | Zoho ManageEngine ADAudit Plus up to 7269 path traversal", "creation_timestamp": "2024-01-25T12:41:18.000000Z"}, {"uuid": "a00530a5-00e3-489a-be4e-507b38f93c87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50782", "type": "seen", "source": "https://t.me/ctinow/179542", "content": "https://ift.tt/G2LMyt3\nCVE-2023-50782", "creation_timestamp": "2024-02-05T22:21:26.000000Z"}, {"uuid": "3556a02e-ccf0-47ac-a2ae-134415368eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50781", "type": "seen", "source": "https://t.me/ctinow/179541", "content": "https://ift.tt/5qEyNzS\nCVE-2023-50781", "creation_timestamp": "2024-02-05T22:21:25.000000Z"}, {"uuid": "3797d6dc-23d2-4197-921e-c0389e537778", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50785", "type": "seen", "source": "https://t.me/ctinow/173296", "content": "https://ift.tt/rQysgul\nCVE-2023-50785", "creation_timestamp": "2024-01-25T07:26:42.000000Z"}, {"uuid": "dc17418a-0032-4af2-b0e3-f1586daabe5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50783", "type": "seen", "source": "https://t.me/ctinow/167982", "content": "https://ift.tt/8rn3TwU\nCVE-2023-50783 | Apache Airflow up to 2.7.x Variable access control", "creation_timestamp": "2024-01-14T10:11:36.000000Z"}, {"uuid": "7ae65c10-3617-4894-b2ec-2b47fed63b8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50784", "type": "seen", "source": "https://t.me/ctinow/166902", "content": "https://ift.tt/ksutrQD\nCVE-2023-50784 | UnrealIRCd up to 6.1.3 Websocket buffer overflow (FEDORA-2023-41f41fbb69)", "creation_timestamp": "2024-01-11T23:22:07.000000Z"}, {"uuid": "1c7e03fe-3d89-40da-be7a-9690b8ebf416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50783", "type": "seen", "source": "https://t.me/ctinow/157614", "content": "https://ift.tt/I1fyzNV\nCVE-2023-50783", "creation_timestamp": "2023-12-21T11:22:23.000000Z"}]}