{"vulnerability": "cve-2023-4896", "sightings": [{"uuid": "e5f568e0-0a47-48b3-9510-e323da9b7f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-48967", "type": "seen", "source": "https://t.me/ctinow/158840", "content": "https://ift.tt/HwTjlg9\nCVE-2023-48967 | noear Solon up to 2.5.12/2.6.0 deserialization (Issue 226)", "creation_timestamp": "2023-12-23T15:21:56.000000Z"}, {"uuid": "f71bcb09-f9fa-46bc-a0e7-ba3ab3929926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-48965", "type": "seen", "source": "https://t.me/ctinow/158753", "content": "https://ift.tt/Ry0qpXJ\nCVE-2023-48965 | ThinkAdmin 6.1.53 URL information disclosure", "creation_timestamp": "2023-12-23T10:21:43.000000Z"}, {"uuid": "7215df45-a4df-44dd-9cff-dc7cef0f24a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-48966", "type": "seen", "source": "https://t.me/ctinow/158754", "content": "https://ift.tt/u9eny3d\nCVE-2023-48966 | ThinkAdmin 6.1.53 ZIP File unrestricted upload", "creation_timestamp": "2023-12-23T10:21:45.000000Z"}, {"uuid": "1a3554b2-4ffa-4a3c-8457-7636e2b7999f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-48964", "type": "seen", "source": "https://t.me/ctinow/157263", "content": "https://ift.tt/t4XEA78\nCVE-2023-48964 | Tenda i6 1.0.0.8 /goform/WifiMacFilterSet buffer overflow", "creation_timestamp": "2023-12-20T20:19:19.000000Z"}, {"uuid": "9548f43e-87f3-4c13-8080-4c339d6a9706", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4896", "type": "seen", "source": "https://t.me/cibsecurity/72453", "content": "\u203c CVE-2023-4896 \u203c\n\nA vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T00:33:09.000000Z"}, {"uuid": "c56e8bf2-6968-4071-9738-ba70203db188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-48963", "type": "seen", "source": "https://t.me/ctinow/157296", "content": "https://ift.tt/Q3Pv2FM\nCVE-2023-48963 | Tenda i6 1.0.0.8 /goform/wifiSSIDget buffer overflow", "creation_timestamp": "2023-12-20T20:46:45.000000Z"}]}