{"vulnerability": "CVE-2023-4535", "sightings": [{"uuid": "a5f394a4-1d66-4316-a73a-0de7d98ef7a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45359", "type": "seen", "source": "https://t.me/cvedetector/7429", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-45359 - Wikimedia MediaWiki Vector Skin Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-45359 \nPublished : Oct. 9, 2024, 6:15 a.m. | 32\u00a0minutes ago \nDescription : An issue was discovered in the Vector Skin component for MediaWiki before 1.39.5 and 1.40.x before 1.40.1. vector-toc-toggle-button-label is not escaped, but should be, because the line param can have markup. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T08:57:21.000000Z"}, {"uuid": "45bce6a7-ff83-49ed-b55b-d697cd5adba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4535", "type": "seen", "source": "https://t.me/cibsecurity/73624", "content": "\u203c CVE-2023-4535 \u203c\n\nAn out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T20:26:02.000000Z"}, {"uuid": "e8a7cd72-f025-4c2e-8fba-8de8c16d7bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45351", "type": "seen", "source": "https://t.me/cibsecurity/71800", "content": "\u203c CVE-2023-45351 \u203c\n\nAtos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.1, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.42.1, and 4000 Manager V10 R0 allow Authenticated Command Injection via AShbr. This is also known as OSFOURK-24039.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:15:41.000000Z"}, {"uuid": "f3e39016-3484-4735-b698-2cd1f992e3f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45350", "type": "seen", "source": "https://t.me/cibsecurity/71799", "content": "\u203c CVE-2023-45350 \u203c\n\nAtos Unify OpenScape 4000 Manager V10 R1 before V10 R1.42.1 and 4000 Manager V10 R0 allow Privilege escalation that may lead to the ability of an authenticated attacker to run arbitrary code via AScm. This is also known as OSFOURK-24034.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:15:40.000000Z"}, {"uuid": "3352f7e3-32f4-4108-b05a-3277c2dc753e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45355", "type": "seen", "source": "https://t.me/cibsecurity/71797", "content": "\u203c CVE-2023-45355 \u203c\n\nAtos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 and 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access via the webservice. This is also known as OSFOURK-24120.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:15:38.000000Z"}, {"uuid": "044bf4a7-56c2-4ae3-ba54-7c133a59849b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45356", "type": "seen", "source": "https://t.me/cibsecurity/71796", "content": "\u203c CVE-2023-45356 \u203c\n\nAtos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access, via dtb pages of the platform portal. This is also known as OSFOURK-23719.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:15:37.000000Z"}, {"uuid": "d72c9c31-4015-4f27-9e4f-778c79700dba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45353", "type": "seen", "source": "https://t.me/cibsecurity/71795", "content": "\u203c CVE-2023-45353 \u203c\n\nAtos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system by leveraging the Common Management Portal web interface for Authenticated remote upload and creation of arbitrary files affecting the underlying operating system. This is also known as OCMP-6591.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:15:35.000000Z"}, {"uuid": "9dd136c2-a313-469e-b394-8307feb2cdc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45354", "type": "seen", "source": "https://t.me/cibsecurity/71794", "content": "\u203c CVE-2023-45354 \u203c\n\nAtos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated remote attacker to execute arbitrary code on the operating system by using the Common Management Portal web interface. This is also known as OCMP-6589.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:33:01.000000Z"}, {"uuid": "198363a5-947b-4d81-b090-86fd90c42229", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45352", "type": "seen", "source": "https://t.me/cibsecurity/71793", "content": "\u203c CVE-2023-45352 \u203c\n\nAtos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system via a Common Management Portal web interface Path traversal vulnerability allowing write access outside the intended folders. This is also known as OCMP-6592.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T07:15:34.000000Z"}]}