{"vulnerability": "cve-2023-3110", "sightings": [{"uuid": "99965864-2fd1-42b8-ac51-bce7a4652153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31102", "type": "seen", "source": "https://t.me/cibsecurity/73491", "content": "\u203c CVE-2023-31102 \u203c\n\n7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-03T06:23:01.000000Z"}, {"uuid": "17c39105-dad8-4540-963a-700f87839408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31102", "type": "seen", "source": "Telegram/MYV5tgGHMagBOoJu6zWW2e_mvCQdKIkIQgY0tsVPuUvWSkU", "content": "", "creation_timestamp": "2023-11-04T09:32:34.000000Z"}, {"uuid": "286f77ee-bb8e-4e87-bd79-85cf6ee5660e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31102", "type": "published-proof-of-concept", "source": "Telegram/AvN7Age6uLpY01dCEzLiPHue5SF0A30PI9WjjT30cibJ2Bc", "content": "", "creation_timestamp": "2023-11-03T20:05:09.000000Z"}, {"uuid": "a5f53e63-fc74-4755-b521-d26b67c2b0a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3110", "type": "seen", "source": "https://t.me/cibsecurity/65399", "content": "\u203c CVE-2023-3110 \u203c\n\nDescription: A vulnerability in SiLabs Unify Gateway 1.3.1 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-22T00:36:39.000000Z"}, {"uuid": "0db8e55f-d49f-4b3a-94f7-9300109ba096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31102", "type": "published-proof-of-concept", "source": "Telegram/apyBcUc7WhsZEJNg7HMbIG5RWswdhpfEnw-xnTdxfTtnJA", "content": "", "creation_timestamp": "2023-11-03T19:05:01.000000Z"}, {"uuid": "3bc0c0b0-8bc8-4c4c-b833-4fa9ceec2a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31101", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/64556", "content": "\u203c CVE-2023-31101 \u203c\n\nInsecure Default Initialization of Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.6.0. Users registered in InLong who joined later can see deleted users' data. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T20:25:57.000000Z"}, {"uuid": "c6e871bf-71d4-43b2-9044-85b7359e514f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31103", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/64555", "content": "\u203c CVE-2023-31103 \u203c\n\nExposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.\u00c2\u00a0Attackers can change the immutable name and type of cluster of InLong.\u00c2\u00a0Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 to solve it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T20:25:54.000000Z"}]}