{"vulnerability": "GHSA-P97H-9FXF-WPQ6", "sightings": [{"uuid": "e0214471-76ee-4b48-bcd0-bf7b1d56d8e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-P97H-9FXF-WPQ6", "type": "seen", "source": "https://t.me/arpsyndicate/301", "content": "#ExploitObserverAlert\n\nGHSA-p97h-9fxf-wpq6\n\nDESCRIPTION: Exploit Observer has 19 entries related to GHSA-P97H-9FXF-WPQ6. A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.\n\nGHSS: 9.8", "creation_timestamp": "2023-11-20T16:46:39.000000Z"}]}