{"vulnerability": "CVE-2023-4962", "sightings": [{"uuid": "519ec731-bf27-4087-882e-721fd2d5741c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49620", "type": "seen", "source": "https://t.me/ctinow/157071", "content": "https://ift.tt/I5jHBcv\nCVE-2023-49620 | Apache DolphinScheduler up to 3.0.x Resource Center authorization", "creation_timestamp": "2023-12-20T15:18:40.000000Z"}, {"uuid": "6b07dbe3-e5eb-4f66-84ae-a4a1e2d3be78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49621", "type": "seen", "source": "https://t.me/ctinow/164946", "content": "https://ift.tt/2TmBNhL\nCVE-2023-49621", "creation_timestamp": "2024-01-09T11:26:27.000000Z"}, {"uuid": "8c35f265-5cfe-4381-a5b6-0d9126f9f56e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49622", "type": "seen", "source": "https://t.me/ctinow/165603", "content": "https://ift.tt/dO6igBU\nCVE-2023-49622 Exploit", "creation_timestamp": "2024-01-10T08:16:21.000000Z"}, {"uuid": "2635334c-886e-4bc9-b7f1-4027556e1ed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49624", "type": "seen", "source": "https://t.me/ctinow/165602", "content": "https://ift.tt/dWDiAFv\nCVE-2023-49624 Exploit", "creation_timestamp": "2024-01-10T08:16:20.000000Z"}, {"uuid": "ce34c2d3-8c97-4e33-92dd-f6428d79e355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49625", "type": "seen", "source": "https://t.me/ctinow/165601", "content": "https://ift.tt/pNiIF5Z\nCVE-2023-49625 Exploit", "creation_timestamp": "2024-01-10T08:16:19.000000Z"}, {"uuid": "ebd0b35c-e610-4947-b360-81699de49b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49624", "type": "seen", "source": "https://t.me/ctinow/163038", "content": "https://ift.tt/FraWP4s\nCVE-2023-49624", "creation_timestamp": "2024-01-04T15:21:39.000000Z"}, {"uuid": "12c56e90-cf1c-4d57-b414-0fe613ad6985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49622", "type": "seen", "source": "https://t.me/ctinow/163037", "content": "https://ift.tt/UAog9sS\nCVE-2023-49622", "creation_timestamp": "2024-01-04T15:21:37.000000Z"}, {"uuid": "287ceb5f-8fa8-449f-815c-77958d069512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49622", "type": "seen", "source": "https://t.me/cibsecurity/74406", "content": "\u203c\ufe0fCVE-2023-49622\u203c\ufe0f\n\nBilling Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.\u00a0The 'itemnameid' parameter of the materialbill.php?actionitemRelation resource does not validate the characters received and they are sent unfiltered to the database.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-05T01:33:15.000000Z"}, {"uuid": "cc2b7203-c293-4263-9203-3cff1b2afd7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49624", "type": "seen", "source": "https://t.me/arpsyndicate/2590", "content": "#ExploitObserverAlert\n\nCVE-2023-49624\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-49624. Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cancelid' parameter of the material_bill.php resource does not validate the characters received and they are sent unfiltered to the database.\n\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-07T00:00:47.000000Z"}, {"uuid": "537b2cb8-109a-4492-92af-41234e37c4d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49625", "type": "seen", "source": "https://t.me/ctinow/163039", "content": "https://ift.tt/pbNokU5\nCVE-2023-49625", "creation_timestamp": "2024-01-04T15:21:40.000000Z"}, {"uuid": "ce96ab58-a7ee-4c11-9b94-6dfe22096ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49625", "type": "seen", "source": "https://t.me/cibsecurity/74408", "content": "\u203c\ufe0fCVE-2023-49625\u203c\ufe0f\n\nBilling Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partylisteditsubmit.php resource does not validate the characters received and they are sent unfiltered to the database.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-05T01:33:25.000000Z"}, {"uuid": "c3228aef-7b2f-4417-9ee3-44e247cd4aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49624", "type": "seen", "source": "https://t.me/cibsecurity/74407", "content": "\u203c\ufe0fCVE-2023-49624\u203c\ufe0f\n\nBilling Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cancelid' parameter of the materialbill.php resource does not validate the characters received and they are sent unfiltered to the database.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-05T01:33:20.000000Z"}]}