{"vulnerability": "CVE-2023-5112", "sightings": [{"uuid": "5ff988ac-34fc-4ef2-9bd1-c37169e3aa77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51126", "type": "seen", "source": "https://t.me/ctinow/166157", "content": "https://ift.tt/STYdhpl\nCVE-2023-51126", "creation_timestamp": "2024-01-10T22:32:14.000000Z"}, {"uuid": "9145b2ee-18c2-4e86-b103-cb297d6e0bd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5112", "type": "seen", "source": "https://t.me/cibsecurity/71374", "content": "\u203c CVE-2023-5112 \u203c\n\nOs Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.This vulnerability allows attackers to inject JS through the \"specials_type_name[1]\" parameter,potentially leading to unauthorized execution of scripts within a user's web browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-01T02:39:14.000000Z"}, {"uuid": "6f6d032d-2887-4dab-9db3-f1bdbe58c88d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51127", "type": "seen", "source": "https://t.me/ctinow/175009", "content": "https://ift.tt/QbTaW6k\nCVE-2023-51127 | FLIR AX8 up to 1.46.16 Symbolic Link File path traversal", "creation_timestamp": "2024-01-28T20:01:55.000000Z"}, {"uuid": "2f0538fe-fdc8-4ce7-be8d-20608852a6a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51126", "type": "seen", "source": "https://t.me/ctinow/175005", "content": "https://ift.tt/uSBCExd\nCVE-2023-51126 | FLIR AX8 up to 1.46.16 /usr/www/res.php value command injection", "creation_timestamp": "2024-01-28T19:31:45.000000Z"}, {"uuid": "e32748da-e853-4f9d-ab00-a104902bc480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51123", "type": "seen", "source": "https://t.me/ctinow/175010", "content": "https://ift.tt/Ur45xTc\nCVE-2023-51123 | D-Link DIR-815 1.01SSb08.bin POST Request soapcgi_main service Privilege Escalation", "creation_timestamp": "2024-01-28T20:01:57.000000Z"}, {"uuid": "93188973-13bd-446e-b8dc-d77396a3400f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51123", "type": "seen", "source": "https://t.me/ctinow/169466", "content": "https://ift.tt/RumaUcA\nCVE-2023-51123 Exploit", "creation_timestamp": "2024-01-17T21:16:28.000000Z"}, {"uuid": "5d91c7e8-d44e-4613-902e-493f30fdd023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51127", "type": "seen", "source": "https://t.me/ctinow/166158", "content": "https://ift.tt/9cqpzI4\nCVE-2023-51127", "creation_timestamp": "2024-01-10T22:32:15.000000Z"}]}