{"vulnerability": "CVE-2023-5115", "sightings": [{"uuid": "ee0d9c08-21bf-4160-82d0-3acf2cc01663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51154", "type": "seen", "source": "https://t.me/cibsecurity/74428", "content": "\u203c\ufe0fCVE-2023-51154\u203c\ufe0f\n\nJizhicms v2.5 was discovered to contain an arbitrary file download vulnerability via the component admincPluginsController.php.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-05T01:35:04.000000Z"}, {"uuid": "d1cdcfe6-56bf-4e73-ae71-819585b37d86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51157", "type": "seen", "source": "https://t.me/cvedetector/6360", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-51157 - ZKTeco WDMS Cross Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2023-51157 \nPublished : Sept. 25, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in ZKTeco WDMS v.5.1.3 Pro allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted script to the Emp Name parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T21:53:52.000000Z"}, {"uuid": "562eb7e9-013a-47e7-a241-f628ed30d925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51154", "type": "seen", "source": "https://t.me/ctinow/166066", "content": "https://ift.tt/yTmwxv3\nCVE-2023-51154 Exploit", "creation_timestamp": "2024-01-10T19:17:04.000000Z"}, {"uuid": "3befd7b1-ab84-4ed1-8b8b-a8748cc16b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5115", "type": "seen", "source": "https://t.me/arpsyndicate/2037", "content": "#ExploitObserverAlert\n\nCVE-2023-5115\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5115.", "creation_timestamp": "2023-12-20T15:41:13.000000Z"}, {"uuid": "34295539-ccae-4104-9a6f-0010b727025d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51154", "type": "seen", "source": "https://t.me/arpsyndicate/2533", "content": "#ExploitObserverAlert\n\nCVE-2023-51154\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-51154. Jizhicms v2.5 was discovered to contain an arbitrary file download vulnerability via the component /admin/c/PluginsController.php.", "creation_timestamp": "2024-01-06T12:27:02.000000Z"}, {"uuid": "768e817a-d613-49f7-a78c-00f5b005ebf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51154", "type": "seen", "source": "https://t.me/ctinow/172590", "content": "https://ift.tt/K9wyB4W\nCVE-2023-51154 | JIZHICMS 2.5 PluginsController.php information disclosure", "creation_timestamp": "2024-01-24T09:11:57.000000Z"}, {"uuid": "a5ff39c8-57cf-4ffd-8250-5aa1e4441d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51154", "type": "seen", "source": "https://t.me/ctinow/163186", "content": "https://ift.tt/GIDeZhp\nCVE-2023-51154", "creation_timestamp": "2024-01-04T20:23:59.000000Z"}]}