{"uuid": "0d55d5bc-895b-4330-954c-36bc891a4a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47119", "type": "seen", "source": "https://t.me/arpsyndicate/2053", "content": "#ExploitObserverAlert\n\nCVE-2023-47119\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-47119. Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, some links can inject arbitrary HTML tags when rendered through our Onebox engine. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.\n\nFIRST-EPSS: 0.000520000\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2023-12-21T17:37:53.000000Z"}