{"vulnerability": "CVE-2023-40619", "sightings": [{"uuid": "6fc57429-40c8-44bb-a4a0-fa72f986e078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40619", "type": "seen", "source": "https://t.me/cibsecurity/70838", "content": "\u203c CVE-2023-40619 \u203c\n\nphpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T22:29:46.000000Z"}]}