{"vulnerability": "CVE-2023-6080", "sightings": [{"uuid": "a05817fd-8176-4770-9b2e-7bf38ebe857d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6080", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhc5porh2l2n", "content": "", "creation_timestamp": "2025-02-03T18:18:30.339905Z"}, {"uuid": "4b0feb8c-c2ce-4c96-9e7c-b1122c17808a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6080", "type": "seen", "source": "https://threatintel.cc/2025/02/04/cve-a-case-study-on.html", "content": "", "creation_timestamp": "2025-02-04T17:28:20.000000Z"}, {"uuid": "4ddf6f8c-d4b4-4ec2-9c45-749729a4b669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6080", "type": "seen", "source": "https://bsky.app/profile/r0ns3n.dk/post/3lhcez47eek2i", "content": "", "creation_timestamp": "2025-02-03T20:29:03.791820Z"}, {"uuid": "03897270-9408-4010-b612-ab60719a3f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6080", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lhjyob6b6i2c", "content": "", "creation_timestamp": "2025-02-06T21:09:31.076303Z"}, {"uuid": "8739d9e2-178f-4910-9a78-0de4f19b4be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2023-6080", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/113962917225909742", "content": "", "creation_timestamp": "2025-02-07T13:48:35.284643Z"}, {"uuid": "deeec1a0-55ad-414e-bd53-2b625da389b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6080", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113940989690696426", "content": "", "creation_timestamp": "2025-02-03T16:52:07.864664Z"}, {"uuid": "dbfa8ee8-20b2-44e4-9c64-7bddaf540d84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6080", "type": "seen", "source": "https://t.me/cvedetector/8334", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-6080 - Lakeside Software SysTrack LsiAgent Installer Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2023-6080 \nPublished : Oct. 18, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : Lakeside Software\u2019s SysTrack LsiAgent Installer version 10.7.8 for Windows contains a local privilege escalation vulnerability which allows attackers SYSTEM level access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T20:15:44.000000Z"}, {"uuid": "852108ed-becf-4dda-8926-b1134d035933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2023-6080", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lhbxo3ldur2h", "content": "", "creation_timestamp": "2025-02-03T16:30:13.857279Z"}]}