{"vulnerability": "CVE-2023-26061", "sightings": [{"uuid": "72eb38ce-b829-4aac-b8ec-88ba167e52e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26061", "type": "seen", "source": "Telegram/w1AIhN8tkRScPmMedq267reFlPzYm1VEaqtfqt_tq4_MkS0n", "content": "", "creation_timestamp": "2025-02-06T02:41:38.000000Z"}, {"uuid": "8efb2248-e6f5-4cad-9121-e6529dc181cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26061", "type": "seen", "source": "https://t.me/cibsecurity/62722", "content": "\u203c CVE-2023-26061 \u203c\n\nAn issue was discovered in Nokia NetAct before 22 FP2211. On the Scheduled Search tab under the Alarm Reports Dashboard page, users can create a script to inject XSS. Input validation was missing during creation of a scheduled task. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-24T20:19:22.000000Z"}]}