[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-1846":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":47},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":44,"name":45,"published":46,"updated":27},1846,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":38,"epss_score":39,"epss_percentile":21,"cve":40,"in_cisa_catalog":42,"date":43,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"medium","The vulnerability can lead to unauthorized access to user passwords, compromising the confidentiality of user accounts.","An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.","Upgrade to Joomla! version 4.2.8 or later.",[33,34,35,36,37],"https://unsafe.sh/go-149780.html","https://twitter.com/gov_hack/status/1626471960141238272/photo/1","https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html","https://nvd.nist.gov/vuln/detail/CVE-2023-23552","https://github.com/20142995/pocsuite3",5.3,0.94527,[41],"CVE-2023-23752",true,"2023-02-16T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2023-23752","Joomla! Webservice - Password Disclosure","2023-07-04T00:00:00Z",["Island",48],{"key":49,"params":50,"result":52},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":51},"{\"text-color\":\"gray\"}",{"head":53},{}]