{"vulnerability": "CVE-2023-51331", "sightings": [{"uuid": "16aaed75-c5a2-4baf-99c7-c0c84b1fc645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51331", "type": "seen", "source": "https://t.me/cvedetector/18573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-51331 - PHPJabbers Cleaning Business Software CSV Injection Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2023-51331 \nPublished : Feb. 20, 2025, 4:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T19:00:44.000000Z"}, {"uuid": "7f0e59eb-e028-43ae-a7e0-b4937e148ee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51331", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "c2f9c4cf-2ecd-4499-b02f-b7519522b13f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51331", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4986", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51331\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T20:33:03.469Z\n\ud83d\udd17 References:\n1. https://www.phpjabbers.com/cleaning-business-software/#sectionDemo\n2. https://packetstorm.news/files/id/176509", "creation_timestamp": "2025-02-21T21:22:39.000000Z"}]}