{"vulnerability": "CVE-2023-4296", "sightings": [{"uuid": "68089cd5-efed-48a0-bb34-37eeea0e43a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42969", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320021678810637", "content": "", "creation_timestamp": "2025-04-11T15:24:57.100737Z"}, {"uuid": "c8f7e85f-0f3e-416d-a2be-c039c634c7bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42969", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkkozxlzy2q", "content": "", "creation_timestamp": "2025-04-11T17:38:08.118267Z"}, {"uuid": "682bfb9f-ef38-4df7-ae70-afea07c42a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42961", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkkp6cd2v2h", "content": "", "creation_timestamp": "2025-04-11T17:38:15.354380Z"}, {"uuid": "3956914a-8f3d-4bed-abf1-0eb9fe3d4dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42969", "type": "seen", "source": "https://t.me/cvedetector/22762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42969 - Apple iOS/iPadOS Safari Sandbox Escape\", \n  \"Content\": \"CVE ID : CVE-2023-42969 \nPublished : April 11, 2025, 3:15 p.m. | 36\u00a0minutes ago \nDescription : An app may be able to break out of its sandbox. This issue is fixed in iOS 17 and iPadOS 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14, macOS Ventura 13.6, macOS Monterey 12.7. The issue was addressed with improved handling of caches. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T18:07:47.000000Z"}, {"uuid": "5d3d0e79-fffd-44a2-a55f-dc67621217e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42962", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42962\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved checks This issue is fixed in iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. A remote attacker may be able to cause a denial-of-service.\n\ud83d\udccf Published: 2024-03-28T15:39:10.717Z\n\ud83d\udccf Modified: 2025-03-19T19:54:10.357Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214035\n2. https://support.apple.com/en-us/HT214034", "creation_timestamp": "2025-03-19T20:18:08.000000Z"}, {"uuid": "074f54c1-e1ae-419c-b04b-22855986e255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42961", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11541", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42961\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A path handling issue was addressed with improved validation. This issue is fixed in iOS 17 and iPadOS 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14, macOS Ventura 13.6, macOS Monterey 12.7. A sandboxed process may be able to circumvent sandbox restrictions.\n\ud83d\udccf Published: 2025-04-11T14:53:59.841Z\n\ud83d\udccf Modified: 2025-04-12T03:55:14.482Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120949\n2. https://support.apple.com/en-us/120329\n3. https://support.apple.com/en-us/120950\n4. https://support.apple.com/en-us/120337\n5. https://support.apple.com/en-us/120328", "creation_timestamp": "2025-04-12T04:51:19.000000Z"}, {"uuid": "cb97a299-26dc-423c-9d5d-f45c364492d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42961", "type": "seen", "source": "https://t.me/cvedetector/22761", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42961 - Apple iOS/ iPadOS/ macOS Path Validation Sandbox Evasion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-42961 \nPublished : April 11, 2025, 3:15 p.m. | 36\u00a0minutes ago \nDescription : A path handling issue was addressed with improved validation. This issue is fixed in iOS 17 and iPadOS 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14, macOS Ventura 13.6, macOS Monterey 12.7. A sandboxed process may be able to circumvent sandbox restrictions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T18:07:43.000000Z"}, {"uuid": "10cf3ad5-3c0e-4b61-b8e6-faee2b2bb565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4296", "type": "seen", "source": "https://t.me/cibsecurity/69402", "content": "\u203c CVE-2023-4296 \u203c\n\n?If an attacker tricks an admin user of PTC Codebeamer into clicking on a malicious link, it may allow the attacker to inject arbitrary code to be executed in the browser on the target device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T02:17:46.000000Z"}]}