{"vulnerability": "CVE-2023-4184", "sightings": [{"uuid": "8b46486e-d108-4ef1-b0d0-9663fe9df7c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41848", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647581995860208", "content": "", "creation_timestamp": "2024-12-13T21:14:41.699294Z"}, {"uuid": "07cf716c-f348-44ac-9dd9-04792efd5624", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647582010112911", "content": "", "creation_timestamp": "2024-12-13T21:14:41.914134Z"}, {"uuid": "44805964-2529-4423-afb4-a55d8792e523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41843", "type": "seen", "source": "https://t.me/cibsecurity/72256", "content": "\u203c CVE-2023-41843 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 allows attacker to execute unauthorized code or commands via crafted HTTP requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-13T18:29:11.000000Z"}, {"uuid": "9dbd8ef2-8dce-4d0a-b0a2-b739ff1c0bb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41842", "type": "seen", "source": "https://t.me/ctinow/205817", "content": "https://ift.tt/jDGPUvQ\nCVE-2023-41842", "creation_timestamp": "2024-03-12T16:32:02.000000Z"}, {"uuid": "53abfedd-c80e-4e73-8746-b418a1296d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41842", "type": "seen", "source": "https://t.me/ctinow/205801", "content": "https://ift.tt/jDGPUvQ\nCVE-2023-41842", "creation_timestamp": "2024-03-12T16:26:34.000000Z"}, {"uuid": "a8623991-e5b7-4478-8b98-7ee6692366b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4184", "type": "seen", "source": "https://t.me/cibsecurity/67832", "content": "\u203c CVE-2023-4184 \u203c\n\nA vulnerability was found in SourceCodester Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file sell_return.php. The manipulation of the argument pid leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-236219.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-06T16:12:24.000000Z"}, {"uuid": "9510c299-baa0-49aa-a22c-e0eaf6c58988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41846", "type": "seen", "source": "https://t.me/cibsecurity/70274", "content": "\u203c CVE-2023-41846 \u203c\n\nA vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions &lt; V2201.0008), Tecnomatix Plant Simulation V2302 (All versions &lt; V2302.0002). The affected application is vulnerable to memory corruption while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T14:23:09.000000Z"}, {"uuid": "e362bca8-948a-4057-86a2-b789e9132aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41844", "type": "seen", "source": "https://t.me/ctinow/164045", "content": "https://ift.tt/WrYUfXi\nCVE-2023-41844 | Fortinet FortiSandbox up to 4.4.2 HTTP Request cross site scripting (FG-IR-23-214)", "creation_timestamp": "2024-01-07T03:06:23.000000Z"}]}