{"vulnerability": "CVE-2023-5631", "sightings": [{"uuid": "093e7b73-7a80-4dd9-8a63-84abf1b25255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-10-26T18:10:02.000000Z"}, {"uuid": "266a55f2-0161-4809-aa14-c39972031ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "MISP/31685ccf-84b1-4db8-8f3a-87d84edbf74d", "content": "", "creation_timestamp": "2024-02-24T12:31:27.000000Z"}, {"uuid": "55276e07-55fe-4d69-aa77-54f9568804f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "MISP/0f810383-867c-42c6-ba59-2c5e4cfacbce", "content": "", "creation_timestamp": "2024-02-29T13:53:00.000000Z"}, {"uuid": "4415df44-9337-4dd3-827c-52ad25bdd1ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971908", "content": "", "creation_timestamp": "2024-12-24T20:35:30.684361Z"}, {"uuid": "bacdde71-f693-4a20-9960-13784c212de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:48.000000Z"}, {"uuid": "ba7065c5-5da6-49fc-a578-7dc62158de4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-5631", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/72b2c094-241b-4afb-89a0-01810c8aa47b", "content": "", "creation_timestamp": "2026-02-02T12:26:48.016922Z"}, {"uuid": "d5020a78-c00b-464d-9850-d010b8d574b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "https://t.me/ctinow/145309", "content": "https://ift.tt/SZyVQn6\nRoundcube webmail zero-day exploited to spy on government entities (CVE-2023-5631)", "creation_timestamp": "2023-10-25T14:46:34.000000Z"}, {"uuid": "f35ea1bf-2a0e-402c-8df4-924a20c29d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "https://t.me/arpsyndicate/1327", "content": "#ExploitObserverAlert\n\nCVE-2023-5631\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-5631. Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker  to load arbitrary JavaScript code.\n\nFIRST-EPSS: 0.009860000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-04T23:02:37.000000Z"}, {"uuid": "c3743a00-f5c1-4313-b6f7-dcebf8c6592f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "https://t.me/arpsyndicate/2767", "content": "#ExploitObserverAlert\n\nCVE-2023-5631\n\nDESCRIPTION: Exploit Observer has 14 entries in 3 file formats related to CVE-2023-5631. Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker  to load arbitrary JavaScript code.\n\nFIRST-EPSS: 0.006800000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-15T07:55:48.000000Z"}, {"uuid": "95971846-42f7-4267-b047-5aad3e062df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5631", "type": "seen", "source": "https://t.me/cibsecurity/72528", "content": "\u203c CVE-2023-5631 \u203c\n\nRoundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attackerto load arbitrary JavaScript code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T18:33:48.000000Z"}]}