{"vulnerability": "CVE-2023-51804", "sightings": [{"uuid": "49708fc1-db85-4273-8d1e-b6dbede34aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51804", "type": "seen", "source": "https://t.me/arpsyndicate/2840", "content": "#ExploitObserverAlert\n\nCVE-2023-51804\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-51804. An issue in rymcu forest v.0.02 allows a remote attacker to obtain sensitive information via manipulation of the HTTP body URL in the com.rymcu.forest.web.api.common.UploadController file.", "creation_timestamp": "2024-01-16T08:32:14.000000Z"}, {"uuid": "b5668a52-dcaf-461d-9013-3e37d306ff68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51804", "type": "seen", "source": "https://t.me/ctinow/178359", "content": "https://ift.tt/q8Eksfm\nCVE-2023-51804 | rymcu forest 0.02 HTTP Body URL com.rymcu.forest.web.api.common.UploadController information disclosure (Issue 149)", "creation_timestamp": "2024-02-03T02:26:54.000000Z"}, {"uuid": "2a7e835d-22aa-4e48-803e-9a3ebcb62c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51804", "type": "seen", "source": "https://t.me/ctinow/173084", "content": "https://ift.tt/aWjvuUo\nCVE-2023-51804 Exploit", "creation_timestamp": "2024-01-24T21:16:23.000000Z"}, {"uuid": "19b8be51-4304-48be-9774-9d9b005952f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51804", "type": "seen", "source": "https://t.me/ctinow/167665", "content": "https://ift.tt/2YlfLvZ\nCVE-2023-51804", "creation_timestamp": "2024-01-13T03:27:00.000000Z"}]}