{"vulnerability": "CVE-2023-3047", "sightings": [{"uuid": "c78949d7-6914-4753-b596-f5f726e62ab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "Telegram/y3fbNErbYarTP6Z34xtGNYscxfofgzSFBrcdEurtrNBIVA", "content": "", "creation_timestamp": "2024-03-07T16:51:53.000000Z"}, {"uuid": "7d12bf98-2204-4c6d-99a7-9becd52cadf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/YourAnonTl3x/3967", "content": "PoC How to exploit CVE-2023-3047 \n\nDetails &gt; https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-03-07T16:50:16.000000Z"}, {"uuid": "ca5c6ef1-a776-43ed-83e3-053ebdb89307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/YourAnonTl3x/6363", "content": "https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-08-05T11:41:22.000000Z"}, {"uuid": "38d4de4d-03c1-47ec-a86f-542073dfa86b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/anonymous_secures/612", "content": "PoC How to exploit CVE-2023-3047 \n\nDetails &gt; https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-03-07T16:49:13.000000Z"}, {"uuid": "ec75ef10-89fe-4479-b98d-d22474dcde19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/anonymous_secures/842", "content": "https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-08-05T11:41:13.000000Z"}, {"uuid": "794e06f3-6c52-4e79-9a95-4e16772c54a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/anonymous_secures/613", "content": "https://ghostmanews.blogspot.com/2024/03/how-to-exploit-cve-2023-3047.html?m=1", "creation_timestamp": "2024-03-07T17:02:22.000000Z"}, {"uuid": "10977df4-1333-4927-8e70-9847512e1132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/YourAnonTl3x/912", "content": "https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-08-05T11:41:22.000000Z"}, {"uuid": "ca687434-2e37-43be-aa7c-b669e46b11e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/YourAnonTl3x/532", "content": "PoC How to exploit CVE-2023-3047 \n\nDetails &gt; https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-03-07T16:50:16.000000Z"}, {"uuid": "fb3ad8f3-98f0-449b-9348-091259fb0b96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/anonymous_secures/1666", "content": "https://ghostmanews.blogspot.com/2024/03/how-to-exploit-cve-2023-3047.html?m=1", "creation_timestamp": "2024-03-07T17:02:22.000000Z"}, {"uuid": "4e3688ad-1bcf-483b-8065-6823042b921e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/anonymous_secures/1664", "content": "PoC How to exploit CVE-2023-3047 \n\nDetails &gt; https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-03-07T16:49:13.000000Z"}, {"uuid": "591e4693-0623-4492-98de-195de076bcf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3047", "type": "published-proof-of-concept", "source": "https://t.me/anonymous_secures/2714", "content": "https://github.com/Phamchie/CVE-2023-3047", "creation_timestamp": "2024-08-05T11:41:13.000000Z"}, {"uuid": "8422670a-82b0-4e88-a32e-55055158812f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30477", "type": "seen", "source": "https://t.me/cibsecurity/68447", "content": "\u203c CVE-2023-30477 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Essitco AFFILIATE Solution plugin &lt;=\u00c2\u00a01.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-14T18:24:31.000000Z"}, {"uuid": "6bdc39d4-150d-4dee-8764-5bcfe370cfdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30473", "type": "seen", "source": "https://t.me/cibsecurity/68622", "content": "\u203c CVE-2023-30473 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Maxim Glazunov YML for Yandex Market plugin &lt;=\u00c2\u00a03.10.7 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T14:41:14.000000Z"}, {"uuid": "0984086c-3eb6-4d50-b1fd-22634b7bd0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30475", "type": "seen", "source": "https://t.me/cibsecurity/68442", "content": "\u203c CVE-2023-30475 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Elliot Sowersby, RelyWP WooCommerce Affiliate Plugin \u00e2\u20ac\u201c Coupon Affiliates plugin &lt;=\u00c2\u00a05.4.5 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-14T18:24:26.000000Z"}, {"uuid": "befa9498-b721-4568-8510-7e8965f09a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30470", "type": "seen", "source": "https://t.me/cibsecurity/64436", "content": "\u203c CVE-2023-30470 \u203c\n\nA use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-19T02:32:31.000000Z"}]}