{"vulnerability": "CVE-2023-3326", "sightings": [{"uuid": "1b1176fe-88e3-46e3-9722-25581ea44e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33269", "type": "seen", "source": "https://t.me/cibsecurity/71537", "content": "\u203c CVE-2023-33269 \u203c\n\nAn issue was discovered in DTS Monitoring 3.57.0. The parameter options within the WGET check function is vulnerable to OS command injection (blind).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T00:27:29.000000Z"}, {"uuid": "be0af5cf-e08f-4108-8796-1263cc6be988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33268", "type": "seen", "source": "https://t.me/cibsecurity/71531", "content": "\u203c CVE-2023-33268 \u203c\n\nAn issue was discovered in DTS Monitoring 3.57.0. The parameter port within the SSL Certificate check function is vulnerable to OS command injection (blind).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T00:24:32.000000Z"}, {"uuid": "fbedad3e-74d9-4a72-8d90-cc708c4915e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33265", "type": "seen", "source": "https://t.me/cibsecurity/66927", "content": "\u203c CVE-2023-33265 \u203c\n\nIn Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T20:31:04.000000Z"}]}