{"vulnerability": "cve-2023-2660", "sightings": [{"uuid": "b6067bfc-dec7-4a7b-a633-633700ce6da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "Telegram/MkdmoAGQPiB_2EcNzRPl9dbkzcoy64yVjpcEuEuws2VpNIQ", "content": "", "creation_timestamp": "2023-03-08T16:18:04.000000Z"}, {"uuid": "05e3cab5-5fe8-4f13-9140-1312aaed1bf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "Telegram/lQcWJRPl4nLrPtvJKOLSN_bdBYwOF6vT6qD7F_HnEJUq3DT8", "content": "", "creation_timestamp": "2025-03-08T04:35:52.000000Z"}, {"uuid": "7d2ce792-9835-42c5-8e2e-b203df0a0b31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "https://t.me/arpsyndicate/2929", "content": "#ExploitObserverAlert\n\nCVE-2023-1326\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-1326. A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-19T13:37:57.000000Z"}, {"uuid": "117b90dc-0644-4800-81bb-a2a43692918d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "https://t.me/arpsyndicate/2928", "content": "#ExploitObserverAlert\n\nCVE-2023-26609\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-26609. ABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field.\n\nFIRST-EPSS: 0.003580000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2024-01-19T13:26:08.000000Z"}, {"uuid": "06cdf36a-140f-44af-9b56-f37b4e9da2b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "https://t.me/arpsyndicate/1525", "content": "#ExploitObserverAlert\n\nCVE-2023-1326\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-1326. A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-06T23:32:26.000000Z"}, {"uuid": "01c929e2-fde0-421a-b32a-3d3d9c58de23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "https://t.me/cibsecurity/58921", "content": "\u203c CVE-2023-26609 \u203c\n\nABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-27T07:36:40.000000Z"}, {"uuid": "ea900f53-dbfd-434f-8392-44ba5e111e4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26601", "type": "seen", "source": "https://t.me/cibsecurity/59521", "content": "\u203c CVE-2023-26601 \u203c\n\nZoho ManageEngine ServiceDesk Plus through 14104, Asset Explorer through 6987, ServiceDesk Plus MSP before 14000, and Support Center Plus before 14000 allow Denial-of-Service (DoS).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T00:13:21.000000Z"}, {"uuid": "38038074-ac11-4f55-93f0-6810a39aafb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26600", "type": "seen", "source": "https://t.me/cibsecurity/59502", "content": "\u203c CVE-2023-26600 \u203c\n\nManageEngine ServiceDesk Plus through 14104, ServiceDesk Plus MSP through 14000, Support Center Plus through 14000, and Asset Explorer through 6987 allow privilege escalation via query reports.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-06T22:13:01.000000Z"}, {"uuid": "427b3ce4-aeb0-4ad9-b6ca-92be5065b9c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26607", "type": "seen", "source": "https://t.me/cibsecurity/58918", "content": "\u203c CVE-2023-26607 \u203c\n\nIn the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-27T02:26:20.000000Z"}, {"uuid": "df1f18d7-21c9-4c3e-af5d-824058a9548a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26605", "type": "seen", "source": "https://t.me/cibsecurity/58917", "content": "\u203c CVE-2023-26605 \u203c\n\nIn the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-27T02:26:19.000000Z"}, {"uuid": "666c30d5-b5f3-4f50-bf23-9a1b11f293ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26606", "type": "seen", "source": "https://t.me/cibsecurity/58916", "content": "\u203c CVE-2023-26606 \u203c\n\nIn the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T15:58:14.000000Z"}, {"uuid": "11bf73b9-010c-4822-bae7-cf8eee01f7fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26602", "type": "seen", "source": "https://t.me/cibsecurity/58914", "content": "\u203c CVE-2023-26602 \u203c\n\nASUS ASMB8 iKVM firmware through 1.14.51 allows remote attackers to execute arbitrary code by using SNMP to create extensions, as demonstrated by snmpset for NET-SNMP-EXTEND-MIB with /bin/sh for command execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-26T22:26:08.000000Z"}, {"uuid": "6a4b8b26-020f-4a99-aef7-c35c79b96ab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8834", "content": "#exploit\n1. CVE-2021-41773\nhttps://github.com/belajarqywok/cve-2021-41773-msf\n\n2. CVE-2023-26604:\nsystemd 246 Local Root Privilege Escalation\nhttps://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html", "creation_timestamp": "2023-08-12T12:43:01.000000Z"}, {"uuid": "48a0e90f-a6e7-474d-b818-f74875511384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26602", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2612", "content": "#exploit\n1. CVE-2023-26602:\nAsus ASMB8 iKVM RCE and SSH Root Access\nhttps://github.com/d1gg0r/CVE-2023-26602\n\n2. CVE-2024-0193:\nLinux Kernel Root Bypass\nhttps://github.com/forsaken0128/CVE-2024-0193-Kernel-Root-Bypass\n\n3. CVE-2024-0252:\nZoho ManageEngine ADSelfService Plus RCE\nhttps://github.com/forsaken0128/CVE-2024-0252-RCE", "creation_timestamp": "2024-08-16T09:09:02.000000Z"}, {"uuid": "d2cde9e0-caeb-406a-871b-9a4580e1983c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-06)", "content": "", "creation_timestamp": "2026-02-06T00:00:00.000000Z"}, {"uuid": "b8279efa-ca9c-4c8e-afe0-4a4eccd940ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-24)", "content": "", "creation_timestamp": "2026-02-24T00:00:00.000000Z"}, {"uuid": "30213db2-7637-4af1-b6cc-5a98bbd55616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3867", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aChecker for CVE-2023-26604\nURL\uff1ahttps://github.com/Zenmovie/CVE-2023-26604\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-03T20:37:44.000000Z"}, {"uuid": "6674af11-3638-47c4-86a4-afd11bfc7fbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26602", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9792", "content": "#exploit\n1. CVE-2023-26602:\nAsus ASMB8 iKVM RCE and SSH Root Access\nhttps://github.com/d1gg0r/CVE-2023-26602\n\n2. CVE-2024-0193:\nLinux Kernel Root Bypass\nhttps://github.com/forsaken0128/CVE-2024-0193-Kernel-Root-Bypass\n\n3. CVE-2024-0252:\nZoho ManageEngine ADSelfService Plus RCE\nhttps://github.com/forsaken0128/CVE-2024-0252-RCE", "creation_timestamp": "2024-01-16T13:05:23.000000Z"}, {"uuid": "c98dc01e-7109-48ef-8f84-d1471c3c8ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26602", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmzyvyhsrb2c", "content": "", "creation_timestamp": "2025-04-17T21:02:31.412284Z"}, {"uuid": "1744a742-50d0-4c64-8b9d-989b1dbc1c7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-22)", "content": "", "creation_timestamp": "2026-02-22T00:00:00.000000Z"}, {"uuid": "366effb6-efae-48ea-847b-ca3a9c830f26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-23)", "content": "", "creation_timestamp": "2026-02-23T00:00:00.000000Z"}, {"uuid": "619e86d4-4a21-4794-abfd-82eb1bd88834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2660", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2938", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2660\n\ud83d\udd39 Description: A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_categories.php. The manipulation of the argument c leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228802 is the identifier assigned to this vulnerability.\n\ud83d\udccf Published: 2023-05-11T15:00:04.984Z\n\ud83d\udccf Modified: 2025-01-24T16:49:26.697Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.228802\n2. https://vuldb.com/?ctiid.228802\n3. https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#4sql-injection-vulnerability-in-view_categoriesphp", "creation_timestamp": "2025-01-24T17:04:49.000000Z"}, {"uuid": "502425f8-7d53-4867-b0f2-e203f2d10ee4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "https://t.me/lamerZen/34", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043c\u043e\u0434\u0443\u043b\u044c systemd. \u0412 systemd 247 \u0431\u044b\u043b\u0430 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044f, \u0441\u0432\u0435\u0440\u044f\u044e\u0449\u0430\u044f euid \u0438 uid. \u0412 ubuntu 20 \u0432\u0435\u0442\u043a\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 rhel 8.x \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f systemd 245. Cve mitre \u043f\u0440\u0438\u043d\u044f\u043b\u0438 \u0443 \u043c\u0435\u043d\u044f \u0440\u0435\u043f\u043e\u0440\u0442 \u0438 \u0437\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-26604. \u041e\u0441\u0442\u0430\u043b\u043e\u0441\u044c \u0434\u043e\u0436\u0434\u0430\u0442\u044c\u0441\u044f \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u0432\u0443\u043b\u043d\u044b.", "creation_timestamp": "2023-02-28T17:45:34.000000Z"}, {"uuid": "b14e9fc3-555f-41e3-a603-e01a4e3ec8cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "https://t.me/arpsyndicate/2879", "content": "#ExploitObserverAlert\n\nCVE-2023-1326\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-1326. A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-16T19:53:47.000000Z"}, {"uuid": "f6f3bc83-4622-42e4-89d2-1a9c9059c33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2660", "type": "seen", "source": "https://t.me/cibsecurity/63892", "content": "\u203c CVE-2023-2660 \u203c\n\nA vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_categories.php. The manipulation of the argument c leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228802 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-11T18:15:26.000000Z"}, {"uuid": "91dcb454-21fb-4891-b27c-60c36f3452f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26604", "type": "seen", "source": "https://t.me/cibsecurity/59378", "content": "\u203c CVE-2023-26604 \u203c\n\nsystemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-03T18:34:29.000000Z"}, {"uuid": "5366e5ef-4687-46b4-8d86-862e054a1df3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26608", "type": "seen", "source": "https://t.me/cibsecurity/59195", "content": "\u203c CVE-2023-26608 \u203c\n\nSOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-01T07:33:11.000000Z"}, {"uuid": "61885e05-3f30-4944-828f-d8d52286df76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26609", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-14)", "content": "", "creation_timestamp": "2025-02-14T00:00:00.000000Z"}, {"uuid": "1083789b-f306-43c9-8693-506bd23a9d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26601", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-26601\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Zoho ManageEngine ServiceDesk Plus through 14104, Asset Explorer through 6987, ServiceDesk Plus MSP before 14000, and Support Center Plus before 14000 allow Denial-of-Service (DoS).\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T15:21:03.205Z\n\ud83d\udd17 References:\n1. https://manageengine.com\n2. https://www.manageengine.com/products/service-desk/CVE-2023-26601.html", "creation_timestamp": "2025-03-06T16:07:03.000000Z"}, {"uuid": "874738cc-312c-4300-b72e-3cb21367e689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-26600", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6683", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-26600\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ManageEngine ServiceDesk Plus through 14104, ServiceDesk Plus MSP through 14000, Support Center Plus through 14000, and Asset Explorer through 6987 allow privilege escalation via query reports.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T15:23:20.089Z\n\ud83d\udd17 References:\n1. https://manageengine.com\n2. https://www.manageengine.com/products/service-desk/CVE-2023-26600.html", "creation_timestamp": "2025-03-06T16:07:03.000000Z"}]}