{"vulnerability": "CVE-2023-50917", "sightings": [{"uuid": "9fafd515-8942-452a-a5dd-93a482dae3fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "18cda409-3528-43ce-9404-6b29394406ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "9cf54d44-526a-4ef4-b687-383a2f1087a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:58.000000Z"}, {"uuid": "1b7603ba-b775-4667-b59d-8cf58c7d3204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6219", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMajorDoMo Unauthenticated RCE: Deep Dive &amp; Exploitation Techniques\nURL\uff1ahttps://github.com/Chocapikk/CVE-2023-50917\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-18T01:20:19.000000Z"}, {"uuid": "d9ee46b5-6940-4a82-b4ac-1013d1c44ccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3iopgxmwh2q", "content": "", "creation_timestamp": "2025-10-18T21:02:27.572024Z"}, {"uuid": "36177f85-2162-4126-b86a-6549fe39a19b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/majordomo_cmd_inject_cve_2023_50917.rb", "content": "", "creation_timestamp": "2024-01-19T22:26:22.000000Z"}, {"uuid": "e4bba7fb-0c6b-4ff4-9f99-4498cc8d725a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/42521e67-5c8d-4b16-a114-e0db686c91a7", "content": "", "creation_timestamp": "2026-02-19T10:22:00.000000Z"}, {"uuid": "96b89304-dd67-46a7-978f-91fe6020180e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://t.me/ctinow/156650", "content": "https://ift.tt/ScwfoUv\nDisclosure of CVE-2023-50917: RCE Vulnerability in MajorDoM", "creation_timestamp": "2023-12-19T23:23:25.000000Z"}, {"uuid": "8ba85618-84b2-4e22-8d9c-9d15060f863f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://t.me/arpsyndicate/2051", "content": "#ExploitObserverAlert\n\nCVE-2023-50917\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50917. MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.\n\nFIRST-EPSS: 0.000420000", "creation_timestamp": "2023-12-20T15:46:03.000000Z"}, {"uuid": "6b5bbe47-b23a-49ee-bb0c-6354d1942ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2301", "content": "#exploit\n1. CVE-2023-50917:\nMajorDoMo Unauthenticated RCE\nhttps://github.com/Chocapikk/CVE-2023-50917\n\n2. CVE-2023-41772:\nUIFuckUp exploit to gain system privileges as user on Windows 10 (&gt;=1809) and 11\nhttps://github.com/R41N3RZUF477/CVE-2023-41772\n\n3. CVE-2023-49786:\nAsterisk 20.1.0 - DoS via DTLS\nhttps://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "creation_timestamp": "2024-08-16T08:57:35.000000Z"}, {"uuid": "9f3c6dc2-6df2-4e7e-bf51-8bbd65e51d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9620", "content": "#exploit\n1. CVE-2023-50917:\nMajorDoMo Unauthenticated RCE\nhttps://github.com/Chocapikk/CVE-2023-50917\n\n2. CVE-2023-41772:\nUIFuckUp exploit to gain system privileges as user on Windows 10 (&gt;=1809) and 11\nhttps://github.com/R41N3RZUF477/CVE-2023-41772\n\n3. CVE-2023-49786:\nAsterisk 20.1.0 - DoS via DTLS\nhttps://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "creation_timestamp": "2023-12-20T11:00:39.000000Z"}]}