{"vulnerability": "cve-2023-5177", "sightings": [{"uuid": "8fc4ba25-8aa7-403e-9d67-bae1bad6d281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51779", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "2fd65a50-e483-44f9-9cc5-390ed52a4a69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51770", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwze4wdypt2c", "content": "", "creation_timestamp": "2025-08-22T21:02:37.297319Z"}, {"uuid": "b06e6777-d9d3-4e17-be0d-f5c6687fea96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51771", "type": "seen", "source": "https://t.me/arpsyndicate/2196", "content": "#ExploitObserverAlert\n\nCVE-2023-51771\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-51771. In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.", "creation_timestamp": "2023-12-28T05:33:48.000000Z"}, {"uuid": "567d44e1-15b3-42e0-bec4-4443cd1eb5bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51771", "type": "seen", "source": "https://t.me/arpsyndicate/2254", "content": "#ExploitObserverAlert\n\nCVE-2023-51771\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-51771. In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.", "creation_timestamp": "2023-12-30T23:11:03.000000Z"}, {"uuid": "2cc8e825-cf87-427c-a278-4968930b810b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5177", "type": "seen", "source": "https://t.me/cibsecurity/72366", "content": "\u203c CVE-2023-5177 \u203c\n\nThe Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 exposes the full path of a file when putting in a non-existent file in a parameter of the shortcode.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T00:38:15.000000Z"}, {"uuid": "1baa0556-74d0-4cd1-be8a-d22b370f44af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51774", "type": "seen", "source": "https://t.me/ctinow/196440", "content": "https://ift.tt/e54UXt9\nCVE-2023-51774", "creation_timestamp": "2024-02-29T10:11:58.000000Z"}, {"uuid": "ce93975f-a719-4083-830d-6865e00938cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51775", "type": "seen", "source": "https://t.me/ctinow/196439", "content": "https://ift.tt/teLTYga\nCVE-2023-51775", "creation_timestamp": "2024-02-29T10:11:57.000000Z"}, {"uuid": "66f9d687-5c02-4458-b233-222487fcd44b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51770", "type": "seen", "source": "https://t.me/ctinow/188363", "content": "https://ift.tt/UaNwcE4\nCVE-2023-51770", "creation_timestamp": "2024-02-20T11:26:28.000000Z"}, {"uuid": "2a1e9ca3-9f51-4c57-ad82-7a76548e3289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51771", "type": "seen", "source": "https://t.me/ctinow/170100", "content": "https://ift.tt/hVxUoIp\nCVE-2023-51771 | starnight MicroHttpServer up to a8ab029 URI lib/server.c _ParseHeader buffer overflow", "creation_timestamp": "2024-01-19T08:41:59.000000Z"}, {"uuid": "d5ab73d1-613e-4550-b8c3-da0000ede41b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51772", "type": "seen", "source": "https://t.me/ctinow/159153", "content": "https://ift.tt/l5rX0cC\nCVE-2023-51772", "creation_timestamp": "2023-12-25T07:27:05.000000Z"}, {"uuid": "2ae7562e-16bc-4379-91ff-5fbb58a4a44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51771", "type": "seen", "source": "https://t.me/ctinow/159134", "content": "https://ift.tt/ayQVXio\nCVE-2023-51771", "creation_timestamp": "2023-12-25T06:26:54.000000Z"}, {"uuid": "d8334f80-6cd0-4361-8e43-ef11adaadc42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51779", "type": "seen", "source": "https://t.me/ctinow/163136", "content": "https://ift.tt/9JFdh27\nCVE-2023-51779", "creation_timestamp": "2024-01-04T17:46:14.000000Z"}, {"uuid": "a7ce7935-f0ce-4187-9d6a-43654468fdb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51770", "type": "seen", "source": "https://t.me/arpsyndicate/3744", "content": "#ExploitObserverAlert\n\nCVE-2023-51770\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-51770. Arbitrary File Read Vulnerability in Apache Dolphinscheduler.  This issue affects Apache DolphinScheduler: before 3.2.1.   We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.", "creation_timestamp": "2024-02-21T07:47:54.000000Z"}, {"uuid": "c46284fa-23e2-4fe0-a0ca-cba719c57f11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51770", "type": "seen", "source": "https://t.me/ctinow/188370", "content": "https://ift.tt/UaNwcE4\nCVE-2023-51770", "creation_timestamp": "2024-02-20T11:31:55.000000Z"}, {"uuid": "8b009cb5-5b8f-45c2-b731-e23e7079b4c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51778", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7469", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51778\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).\n\ud83d\udccf Published: 2024-07-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T18:32:58.691Z\n\ud83d\udd17 References:\n1. https://jungo.com/windriver/versions/\n2. https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf\n3. https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", "creation_timestamp": "2025-03-13T18:42:31.000000Z"}, {"uuid": "51993774-a36d-4888-bd3b-50bdd78ce6e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51772", "type": "seen", "source": "https://t.me/ctinow/170071", "content": "https://ift.tt/q15AYgj\nCVE-2023-51772 | One Identity Password Manager up to 5.13.0 Kiosk Mode access control", "creation_timestamp": "2024-01-19T07:11:36.000000Z"}, {"uuid": "4a0a4a15-798b-46e3-803c-f2899a90ae83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-51771", "type": "seen", "source": "https://t.me/ctinow/162722", "content": "https://ift.tt/BmEuMcJ\nCVE-2023-51771 Exploit", "creation_timestamp": "2024-01-04T01:17:23.000000Z"}]}