{"vulnerability": "CVE-2023-4311", "sightings": [{"uuid": "833c666e-e97d-42df-9da0-0725dbecf085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43114", "type": "seen", "source": "https://gist.github.com/jakirkham/b16b96bb6b20b7a5405e686931fd28cd", "content": "", "creation_timestamp": "2026-01-14T19:38:38.000000Z"}, {"uuid": "b65635e5-7e57-4fb5-ba5d-d7c2088ad507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5247", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA small write-up with examples to understand CVE-2023-43115\nURL\uff1ahttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-02T19:55:45.000000Z"}, {"uuid": "39cd1a1c-7892-4f5e-9f4a-bd4884b0104f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5248", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA small write-up with examples to understand CVE-2023-43115\nURL\uff1ahttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-09-29T07:39:35.000000Z"}, {"uuid": "59e00991-de85-4ffe-9a4f-42319a933964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43119", "type": "seen", "source": "https://t.me/cibsecurity/72343", "content": "\u203c CVE-2023-43119 \u203c\n\nAn Access Control issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, also fixed in 22.7, 31.7.2 allows attackers to gain escalated privileges using crafted telnet commands via Redis server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T00:32:09.000000Z"}, {"uuid": "351bf349-cee6-40ca-9882-f288f515c954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "seen", "source": "https://t.me/cibsecurity/70640", "content": "\u203c CVE-2023-43115 \u203c\n\nIn Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-18T12:41:22.000000Z"}, {"uuid": "7756df3c-1f20-4068-b02f-c968b05faf2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43114", "type": "seen", "source": "https://t.me/cibsecurity/70638", "content": "\u203c CVE-2023-43114 \u203c\n\nAn issue was discovered in Qt before 5.15.16, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3 on Windows. When using the GDI font engine, if a corrupted font is loaded via QFontDatabase::addApplicationFont{FromData], then it can cause the application to crash because of missing length checks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-18T12:41:20.000000Z"}, {"uuid": "2f39302d-9a93-4da9-8d5e-5532ee8ef05a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/169619", "content": "https://ift.tt/zJ7ajKe\nCVE-2023-43116 | Buildkite Elastic CI for AWS up to 5.22.4/6.7.0 PIPELINE_PATH symlink (ATREDIS-2023-0003)", "creation_timestamp": "2024-01-18T09:11:22.000000Z"}, {"uuid": "2936f44f-ac83-403b-b5a8-395f4b04734a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/162238", "content": "https://ift.tt/Ovk5d2s\nCVE-2023-43116 Exploit", "creation_timestamp": "2024-01-03T08:16:44.000000Z"}, {"uuid": "3a0c5207-9e2a-4485-a588-abfead301320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4311", "type": "seen", "source": "https://t.me/ctinow/167201", "content": "https://ift.tt/N0uZaWR\nCVE-2023-4311 | Vrm 360 3D Model Viewer Plugin up to 1.2.1 on WordPress Shortcode unrestricted upload", "creation_timestamp": "2024-01-12T11:36:30.000000Z"}, {"uuid": "5d1b3ced-f9c0-44f5-8c94-9c5ffae604d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4311", "type": "seen", "source": "https://t.me/ctinow/158031", "content": "https://ift.tt/v6o2qan\nCVE-2023-4311 Exploit", "creation_timestamp": "2023-12-21T23:16:40.000000Z"}, {"uuid": "2c56ad1e-c2c1-49b9-b2b1-8f8c48a0267b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/158315", "content": "https://ift.tt/07EMP3x\nCVE-2023-43116", "creation_timestamp": "2023-12-22T11:22:11.000000Z"}, {"uuid": "0744d5e0-50ce-4649-b5d6-4e5e3f9223e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9155", "content": "#exploit\n1. CVE-2023-43115:\nArtifex Ghostscript GhostPDL gdevijs.c Privilege Escalation\nhttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n2. iRacing Exploit allows attackers to take control of user's computer\nhttps://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html", "creation_timestamp": "2023-10-07T12:20:43.000000Z"}, {"uuid": "0d791f2f-0555-47a0-8447-87562f9eff10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1288", "content": "#exploit\n1. CVE-2023-43115:\nArtifex Ghostscript GhostPDL gdevijs.c Privilege Escalation\nhttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n2. iRacing Exploit allows attackers to take control of user's computer\nhttps://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html", "creation_timestamp": "2024-08-16T08:32:29.000000Z"}]}