{"vulnerability": "cve-2023-4903", "sightings": [{"uuid": "d030563f-6d84-4fc4-890b-f3a9c6c17c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49038", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6178", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-49038\nURL\uff1ahttps://github.com/christopher-pace/CVE-2023-49038\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-14T02:05:05.000000Z"}, {"uuid": "510dd9dc-1b8e-4a2c-894d-2a78805ea74c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49034", "type": "seen", "source": "https://t.me/arpsyndicate/3760", "content": "#ExploitObserverAlert\n\nCVE-2023-49034\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-49034. Cross Site Scripting (XSS) vulnerability in ProjeQtOr 11.0.2 allows a remote attacker to execute arbitrary code via a crafted script to thecheckvalidHtmlText function in the ack.php and security.php files.", "creation_timestamp": "2024-02-21T13:19:13.000000Z"}, {"uuid": "fb26d8bd-d8b0-4d1a-a902-4339cc018fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49032", "type": "seen", "source": "https://t.me/ctinow/157442", "content": "https://ift.tt/fq8nIYU\nCVE-2023-49032", "creation_timestamp": "2023-12-21T01:23:57.000000Z"}, {"uuid": "efc712e4-f89b-4258-97e5-2c781aae87ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49032", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13242", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-49032\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in LTB Self Service Password before v.1.5.4 allows a remote attacker to execute arbitrary code and obtain sensitive information via hijack of the SMS verification code function to arbitrary phone.\n\ud83d\udccf Published: 2023-12-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T14:58:58.571Z\n\ud83d\udd17 References:\n1. https://github.com/ltb-project/self-service-password/issues/816\n2. https://github.com/piuppi/Proof-of-Concepts/blob/main/ltb-project/README.md", "creation_timestamp": "2025-04-24T15:06:30.000000Z"}, {"uuid": "0ea40844-1bcd-4f6a-aea5-617422413b1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49031", "type": "seen", "source": "https://t.me/cvedetector/19409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-49031 - Tikit eMarketing Platform Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-49031 \nPublished : March 3, 2025, 6:15 p.m. | 2\u00a0hours, 6\u00a0minutes ago \nDescription : Directory Traversal (Local File Inclusion) vulnerability in Tikit (now Advanced) eMarketing platform 6.8.3.0 allows a remote attacker to read arbitrary files and obtain sensitive information via a crafted payload to the filename parameter to the OpenLogFile endpoint. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:52.000000Z"}, {"uuid": "7e2f0fd5-d538-4c81-9b22-41a585df6988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49030", "type": "seen", "source": "https://t.me/ctinow/155591", "content": "https://ift.tt/polb83s\nCVE-2023-49030 | in32ns KLive up to 2019-1-19 web/user.php sql injection", "creation_timestamp": "2023-12-17T12:41:53.000000Z"}, {"uuid": "206756b7-2bb6-4b9f-b250-798bbe35f91f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49038", "type": "seen", "source": "https://t.me/ctinow/189920", "content": "https://ift.tt/6NYhaMQ\nCVE-2023-49038 | Buffalo LS210D 1.78-0.03 Ping Utility os command injection", "creation_timestamp": "2024-02-21T18:46:42.000000Z"}, {"uuid": "565de8ff-57c6-413e-afe6-cd4dba972a23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49034", "type": "seen", "source": "https://t.me/ctinow/188961", "content": "https://ift.tt/qx7u8ig\nCVE-2023-49034", "creation_timestamp": "2024-02-20T22:31:53.000000Z"}, {"uuid": "49213fe2-529c-421b-b2b2-7ca4bcd5b7da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49034", "type": "seen", "source": "https://t.me/ctinow/188953", "content": "https://ift.tt/qx7u8ig\nCVE-2023-49034", "creation_timestamp": "2024-02-20T22:26:59.000000Z"}, {"uuid": "6458282c-31f5-4fe5-b943-6d1d1b7764a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49038", "type": "seen", "source": "https://t.me/ctinow/180257", "content": "https://ift.tt/2qZCaXj\nCVE-2023-49038 Exploit", "creation_timestamp": "2024-02-06T19:16:40.000000Z"}, {"uuid": "b2e75c57-db17-4dbc-a4d4-52ad2322a0fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49038", "type": "seen", "source": "https://t.me/ctinow/175561", "content": "https://ift.tt/dxjzJHO\nCVE-2023-49038", "creation_timestamp": "2024-01-29T22:21:50.000000Z"}, {"uuid": "3d1157f5-a7dd-454d-9491-972fe9d41937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49032", "type": "seen", "source": "https://t.me/ctinow/167962", "content": "https://ift.tt/VzOK3f5\nCVE-2023-49032 | LTB Self Service Password up to 1.5.3 SMS Verification Code Privilege Escalation (Issue 816)", "creation_timestamp": "2024-01-14T08:36:56.000000Z"}, {"uuid": "11c5193b-5739-4eb3-8b10-23aea53e05f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4903", "type": "seen", "source": "https://t.me/cibsecurity/70344", "content": "\u203c CVE-2023-4903 \u203c\n\nInappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T00:23:10.000000Z"}, {"uuid": "f3627e33-8e5e-4aa3-92fc-c02f0528b799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49031", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljit77q6ml2a", "content": "", "creation_timestamp": "2025-03-03T20:49:21.804614Z"}, {"uuid": "ae556c51-2cc5-49e5-a18e-71cc03895248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-49031", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ljleeqmfcr2w", "content": "", "creation_timestamp": "2025-03-04T21:02:00.226465Z"}]}