{"vulnerability": "CVE-2023-5171", "sightings": [{"uuid": "ef40ae6a-803f-4f2a-a22b-90409302e6a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51717", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18507", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51717\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Dataiku DSS before 11.4.5 and 12.4.1 has Incorrect Access Control that could lead to a full authentication bypass.\n\ud83d\udccf Published: 2024-01-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-16T19:09:20.053Z\n\ud83d\udd17 References:\n1. https://dataiku.com\n2. https://doc.dataiku.com/dss/latest/security/advisories/dsa-2023-010.html", "creation_timestamp": "2025-06-16T19:40:48.000000Z"}, {"uuid": "91aae29b-145b-4154-a342-288f20407a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51711", "type": "seen", "source": "https://t.me/ctinow/186968", "content": "https://ift.tt/WciaeUo\nCVE-2023-51711 | Regify Regipay Client 4.5.1.0 on Windows uncontrolled search path", "creation_timestamp": "2024-02-17T16:46:47.000000Z"}, {"uuid": "d7c38769-002c-4b76-8455-1ada4c919b07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51717", "type": "seen", "source": "https://t.me/ctinow/174025", "content": "https://ift.tt/4K5rpNv\nCVE-2023-51717 | Dataiku DSS up to 11.4.4/12.4.0 improper authentication (dsa-2023-010)", "creation_timestamp": "2024-01-26T07:36:49.000000Z"}, {"uuid": "c523c83f-902d-49a6-8fff-786cd2559686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51714", "type": "seen", "source": "https://t.me/ctinow/169907", "content": "https://ift.tt/TKf8CBd\nCVE-2023-51714 | Qt up to 5.15.16/6.2.10/6.5.3/6.6.1 HTTP/2 HAndler hpacktable.cpp integer overflow", "creation_timestamp": "2024-01-18T20:22:06.000000Z"}, {"uuid": "a48b4516-7729-4f87-a60a-0f8c92973c13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51711", "type": "seen", "source": "https://t.me/ctinow/172574", "content": "https://ift.tt/l7NBFib\nCVE-2023-51711", "creation_timestamp": "2024-01-24T08:26:47.000000Z"}, {"uuid": "a895d92d-9539-489e-941e-d350154fac4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51713", "type": "seen", "source": "https://t.me/ctinow/164696", "content": "https://ift.tt/jRbQyoO\nCVE-2023-51713 Exploit", "creation_timestamp": "2024-01-08T23:17:23.000000Z"}, {"uuid": "b74f6ffb-9525-4e7a-8018-23f2d1e6c4e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51717", "type": "seen", "source": "https://t.me/ctinow/164775", "content": "https://ift.tt/ypOBov3\nCVE-2023-51717", "creation_timestamp": "2024-01-09T03:26:16.000000Z"}, {"uuid": "aa91ac44-4ade-407f-afcf-d5de0ca7965b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51712", "type": "seen", "source": "https://t.me/cvedetector/4930", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-51712 - \"Trusted Firmware-M LogIn Argument Injection Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2023-51712 \nPublished : Sept. 5, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : An issue was discovered in Trusted Firmware-M through 2.0.0. The lack of argument verification in the logging subsystem allows attackers to read sensitive data via the login function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T18:52:53.000000Z"}, {"uuid": "3e795bdb-35bf-4d73-9b0d-ef0f19d117a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51719", "type": "seen", "source": "https://t.me/ctinow/182567", "content": "https://ift.tt/cWjO24B\nCVE-2023-51719 | Hathway Skyworth Router CM5100 up to 4.1.1.24 Web Interface Traceroute cross site scripting (CIVN-2024-0013)", "creation_timestamp": "2024-02-10T15:16:58.000000Z"}, {"uuid": "92b05329-cfb4-4872-9f4f-7b3231f191db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51713", "type": "seen", "source": "https://t.me/ctinow/158170", "content": "https://ift.tt/Mpds02b\nCVE-2023-51713", "creation_timestamp": "2023-12-22T04:22:08.000000Z"}, {"uuid": "988297a0-7f61-4f28-98db-afda1509cb25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51713", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m2mzletf7b26", "content": "", "creation_timestamp": "2025-10-07T21:02:45.314503Z"}, {"uuid": "5796dbe2-ed0a-432c-85bc-6cc2d445e19e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51713", "type": "seen", "source": "https://t.me/arpsyndicate/4606", "content": "#ExploitObserverAlert\n\nCVE-2023-51713\n\nDESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2023-51713. make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics.\n\nFIRST-EPSS: 0.000530000\nNVD-IS: 3.6\nNVD-ES: 3.9\nARPS-EXPLOITABILITY: 0.5963488", "creation_timestamp": "2024-04-12T11:41:16.000000Z"}, {"uuid": "7d064381-b562-4dff-810c-f803f9e1e50d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51713", "type": "seen", "source": "Telegram/t6kQwAsHFIDTYrbXcitx52aQvl3Kg6pWPbORge7EoLmVRLQ", "content": "", "creation_timestamp": "2024-05-07T23:12:41.000000Z"}, {"uuid": "b8f448be-9673-4f0e-9b10-dab1f0a541b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51714", "type": "seen", "source": "https://t.me/ctinow/159093", "content": "https://nvd.nist.gov/vuln/detail/CVE-2023-51714\nCVE-2023-51714", "creation_timestamp": "2023-12-24T22:26:51.000000Z"}]}