{"vulnerability": "CVE-2023-4978", "sightings": [{"uuid": "5f5dc1f4-e76d-4ac9-a418-f066186cabaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-02)", "content": "", "creation_timestamp": "2025-01-02T00:00:00.000000Z"}, {"uuid": "7731ac63-eef0-4f0d-979d-e45df83cb7a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113989803836087659", "content": "", "creation_timestamp": "2025-02-12T07:46:12.471607Z"}, {"uuid": "9bf4fc88-d1d6-468a-b95b-45627b788644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxq7ott6w2c", "content": "", "creation_timestamp": "2025-02-12T08:15:28.801056Z"}, {"uuid": "92fff1df-94d8-4fdd-b319-e2d87530f349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhy5mhw7so2y", "content": "", "creation_timestamp": "2025-02-12T12:15:16.556520Z"}, {"uuid": "bb748afb-07bf-45d7-9860-36d7fc802018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "79dccf33-8e8b-4b29-8c0f-ee71b034d66a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://bsky.app/profile/JackRacc.furry.engineer.ap.brid.gy/post/3lr4n7ogwxem2", "content": "", "creation_timestamp": "2025-06-08T19:52:35.324659Z"}, {"uuid": "033475a1-c2ed-4de4-9250-25a0dcce11e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-09)", "content": "", "creation_timestamp": "2025-11-09T00:00:00.000000Z"}, {"uuid": "84f5ac67-ea2f-4dd3-a4df-e434b6c6d961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-09)", "content": "", "creation_timestamp": "2025-12-09T00:00:00.000000Z"}, {"uuid": "8fb603e4-e714-4f98-ab26-6e3008bd96a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-01)", "content": "", "creation_timestamp": "2026-03-01T00:00:00.000000Z"}, {"uuid": "9a6ee725-ce58-4b62-b357-e237cf81507b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-18)", "content": "", "creation_timestamp": "2026-02-18T00:00:00.000000Z"}, {"uuid": "60b5491c-9111-4cb2-b03d-c8e0eeeecf99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "Telegram/3IrueFNBG5kOuTyPVgTocC4pI9-9za7N9sC8QnALtlvPgsH1", "content": "", "creation_timestamp": "2025-02-14T10:04:03.000000Z"}, {"uuid": "a77890e9-a17c-4f8e-86cd-8353ea05c2b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "seen", "source": "Telegram/2zKGFgFi0dym9lAvS6iBdbUelA0yXhkXHKbb34RKLjUnNEU", "content": "", "creation_timestamp": "2024-03-24T15:47:53.000000Z"}, {"uuid": "3d8903d9-5cab-452d-a862-8f623dce439f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49782", "type": "seen", "source": "https://t.me/ctinow/161138", "content": "https://ift.tt/kICHos5\nCVE-2023-49782 | CollaboraOnline prior 23.5.601 Built-in CODE Server App proxy.php cross site scripting (GHSA-8xm5-pgfr-8mjr)", "creation_timestamp": "2023-12-31T17:11:32.000000Z"}, {"uuid": "a086a190-8652-493f-b70f-b0d4fb98d13b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49786", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2301", "content": "#exploit\n1. CVE-2023-50917:\nMajorDoMo Unauthenticated RCE\nhttps://github.com/Chocapikk/CVE-2023-50917\n\n2. CVE-2023-41772:\nUIFuckUp exploit to gain system privileges as user on Windows 10 (&gt;=1809) and 11\nhttps://github.com/R41N3RZUF477/CVE-2023-41772\n\n3. CVE-2023-49786:\nAsterisk 20.1.0 - DoS via DTLS\nhttps://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "creation_timestamp": "2024-08-16T08:57:35.000000Z"}, {"uuid": "1f8d75bf-103b-4c54-8aa9-d14fb8ca9e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4051", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-49780\n\ud83d\udd25 CVSS Score: 6.2 (CVSS_V3)\n\ud83d\udd39 Description: Cross-site scripting vulnerability exists in acmailer CGI ver.4.0.5 and earlier. An arbitrary script may be executed on the web browser of the user who accessed the management page of the affected product.\n\ud83d\udccf Published: 2025-02-12T09:31:44Z\n\ud83d\udccf Modified: 2025-02-12T09:31:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-49780\n2. https://acmailer.jp/info/de.cgi?id=113\n3. https://jvn.jp/en/jp/JVN84319378", "creation_timestamp": "2025-02-12T10:08:52.000000Z"}, {"uuid": "b33cd19f-46d4-454d-ae8a-566e5070f744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://t.me/cvedetector/17828", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-49780 - AcMailer Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-49780 \nPublished : Feb. 12, 2025, 8:15 a.m. | 28\u00a0minutes ago \nDescription : Cross-site scripting vulnerability exists in acmailer CGI ver.4.0.5 and earlier. An arbitrary script may be executed on the web browser of the user who accessed the management page of the affected product. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T10:10:56.000000Z"}, {"uuid": "978f0e07-bbbb-4bf7-abd6-42ecccc48c9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "seen", "source": "Telegram/xsiPTsyArUELdJNcqMaP3X2D7BvK--Wvf2LqFFwki5KLvQ", "content": "", "creation_timestamp": "2024-03-23T20:04:35.000000Z"}, {"uuid": "9791577a-9e6d-404e-a22b-0e07f2e649c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/4015", "content": "Scan for [CVE-2023-49785] ChatGPT-Next-Web - SSRF/XSS\n\n Download\n BugCod3", "creation_timestamp": "2024-03-23T00:57:52.000000Z"}, {"uuid": "ee5de6f9-5ade-4fff-a9da-3351c8885371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49783", "type": "seen", "source": "https://t.me/ctinow/172029", "content": "https://ift.tt/akjCBGf\nCVE-2023-49783", "creation_timestamp": "2024-01-23T15:26:46.000000Z"}, {"uuid": "5be5c495-e521-4ace-b29a-3267e25566c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49786", "type": "seen", "source": "https://t.me/ctinow/159782", "content": "https://ift.tt/nY8wjCq\nCVE-2023-49786 Exploit", "creation_timestamp": "2023-12-27T21:16:45.000000Z"}, {"uuid": "9c7184ce-e6d1-40b0-839a-2bb8932be1b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49786", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9620", "content": "#exploit\n1. CVE-2023-50917:\nMajorDoMo Unauthenticated RCE\nhttps://github.com/Chocapikk/CVE-2023-50917\n\n2. CVE-2023-41772:\nUIFuckUp exploit to gain system privileges as user on Windows 10 (&gt;=1809) and 11\nhttps://github.com/R41N3RZUF477/CVE-2023-41772\n\n3. CVE-2023-49786:\nAsterisk 20.1.0 - DoS via DTLS\nhttps://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "creation_timestamp": "2023-12-20T11:00:39.000000Z"}, {"uuid": "42386ffe-c335-4c5c-9a9e-4065c12503aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10146", "content": "#exploit\n1. CVE-2024-1403:\nProgress OpenEdge Authentication Bypass\nhttps://www.horizon3.ai/attack-research/attack-blogs/cve-2024-1403-progress-openedge-authentication-bypass-deep-dive\n\n2. CVE-2023-20048:\nCisco Firepower Management Center RCE\nhttps://packetstormsecurity.com/files/177562/Cisco-Firepower-Management-Center-Remote-Command-Execution.html\n\n3. CVE-2023-49785:\nNextChat Super SSRF\nhttps://www.horizon3.ai/attack-research/attack-blogs/nextchat-an-ai-chatbot-that-lets-you-talk-to-anyone-you-want-to", "creation_timestamp": "2024-03-14T17:35:15.000000Z"}, {"uuid": "8dcff444-be3d-46a6-b669-ac92f1970f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/6373", "content": "Scan for [CVE-2023-49785] ChatGPT-Next-Web - SSRF/XSS\n\n\u2b07\ufe0f Download\n\ud83d\udd13 BugCod3\n\n#BugBounty #Nuclei #Templates \n\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\u2796\n\ud83d\udce3 T.me/BugCod3 \n\ud83d\udce3 T.me/LearnExploit", "creation_timestamp": "2024-03-22T20:03:31.000000Z"}, {"uuid": "58932fdf-bbad-4c60-b88d-f36df1c55554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49780", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-49780\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T08:15:08.013\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://acmailer.jp/info/de.cgi?id=113\n2. https://jvn.jp/en/jp/JVN84319378/", "creation_timestamp": "2025-02-12T09:08:28.000000Z"}, {"uuid": "cd3fede0-315f-4724-a2eb-797631e7e2d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "seen", "source": "https://t.me/arpsyndicate/4186", "content": "#ExploitObserverAlert\n\nCVE-2023-49785\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-49785.\n\nFIRST-EPSS: 0.000490000", "creation_timestamp": "2024-03-13T08:39:26.000000Z"}, {"uuid": "3748ab4b-7534-4a6c-b384-d5e50233a0d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "seen", "source": "https://t.me/true_secator/5515", "content": "ChatGPT-Next-Web, \u0431\u043e\u043b\u0435\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a NextChat \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d  SSRF-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u0430\u043c \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u0430\u043f\u0443\u0449\u0435\u043d \u0435\u0433\u043e \u0432\u0438\u0434\u0436\u0435\u0442.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 NextChat \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2023-49785 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043e 2.11.2, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0432\u043b\u0438\u044f\u044f \u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c 7500 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432, \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0445 \u043a \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443.\n\nNextChat \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043a\u0440\u043e\u0441\u0441\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435\u043d\u043d\u044b\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0439 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u0447\u0430\u0442\u0430, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0441 ChatGPT. \n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 Horizon3 \u0431\u0430\u0433 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f \u043a \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u043c \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c \u0442\u043e\u0447\u043a\u0430\u043c HTTP, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c HTTP POST, PUT \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432.\n\n\u041a\u0430\u043a \u0433\u043e\u0432\u043e\u0440\u044f\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u0433\u043e IP-\u0430\u0434\u0440\u0435\u0441\u0430, \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0442\u0440\u0430\u0444\u0438\u043a, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u0434\u0440\u0443\u0433\u0438\u0445 \u0446\u0435\u043b\u0435\u0439 \u0432 \u0441\u0435\u0442\u0438, \u0447\u0435\u0440\u0435\u0437 \u044d\u0442\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0435 \u043f\u0440\u043e\u043a\u0441\u0438.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0437\u0430\u044f\u0432\u0438\u043b\u0438, \u0447\u0442\u043e \u043e\u043d\u0438 \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d\u044b \u0431\u044b\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043d\u0435 \u0441\u043c\u043e\u0433 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043f\u043e\u0447\u0442\u0438 \u0442\u0440\u0435\u0445 \u043c\u0435\u0441\u044f\u0446\u0435\u0432.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e \u0438 \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043f\u0430\u0442\u0447 \u043d\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u043e\u0441\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u044b \u043e \u0440\u0438\u0441\u043a\u0430\u0445 \u0438 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0442\u044c \u043c\u0435\u0440\u044b \u0434\u043b\u044f \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u0449\u0435\u0440\u0431\u0430 \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e.", "creation_timestamp": "2024-03-13T14:00:55.000000Z"}, {"uuid": "fb036338-f333-46ec-bb0e-6d35c0b2c48d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "seen", "source": "https://t.me/ctinow/205223", "content": "https://ift.tt/72q3iOc\nCVE-2023-49785", "creation_timestamp": "2024-03-12T01:26:58.000000Z"}, {"uuid": "86f5ac8d-05b2-44ee-8afc-b62d63d56c4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49785", "type": "seen", "source": "https://t.me/ctinow/205222", "content": "https://ift.tt/72q3iOc\nCVE-2023-49785", "creation_timestamp": "2024-03-12T01:26:57.000000Z"}, {"uuid": "5702f1ed-074a-49f5-835e-e5543bb693bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49783", "type": "seen", "source": "https://t.me/ctinow/186846", "content": "https://ift.tt/8zFqIWB\nCVE-2023-49783 | SilverStripe Admin up to 1.13.18/2.1.7 getCheckPermissions authorization (GHSA-j3m6-gvm8-mhvw)", "creation_timestamp": "2024-02-17T09:41:46.000000Z"}]}