{"uuid": "5d655923-fbb4-40ce-b50a-6000ea9c0267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28382", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28382\n\ud83d\udd39 Description: Directory traversal vulnerability in ESS REC Agent Server Edition series allows an authenticated attacker to view or alter an arbitrary file on the server. Affected products and versions are as follows: ESS REC Agent Server Edition for Linux V1.0.0 to V1.4.3, ESS REC Agent Server Edition for Solaris V1.1.0 to V1.4.0, ESS REC Agent Server Edition for HP-UX V1.1.0 to V1.4.0, and ESS REC Agent Server Edition for AIX V1.2.0 to V1.4.1\n\ud83d\udccf Published: 2023-05-26T00:00:00\n\ud83d\udccf Modified: 2025-01-15T15:49:42.252Z\n\ud83d\udd17 References:\n1. https://customer.et-x.jp/app/answers/detail/a_id/2260\n2. https://jvn.jp/en/jp/JVN19243534/", "creation_timestamp": "2025-01-15T15:55:01.000000Z"}