{"vulnerability": "CVE-2023-4344", "sightings": [{"uuid": "4c5333fa-9ca2-4885-bc4b-07e4f8e2a8fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43449", "type": "seen", "source": "https://t.me/ctinow/168600", "content": "https://ift.tt/31FOqSE\nCVE-2023-43449", "creation_timestamp": "2024-01-16T03:26:47.000000Z"}, {"uuid": "9db755aa-00a1-4177-b7d0-a1a02ef71f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43449", "type": "seen", "source": "https://t.me/arpsyndicate/2921", "content": "#ExploitObserverAlert\n\nCVE-2023-43449\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43449. An issue in HummerRisk HummerRisk v.1.10 thru 1.4.1 allows an authenticated attacker to execute arbitrary code via a crafted request to the service/LicenseService component.\n\nFIRST-EPSS: 0.000420000", "creation_timestamp": "2024-01-19T10:40:05.000000Z"}, {"uuid": "6ab251f8-4ec9-4fb2-ae0b-666d9b511a94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43449", "type": "seen", "source": "https://t.me/ctinow/178602", "content": "https://ift.tt/hkwRE9f\nCVE-2023-43449 | HummerRisk up to 1.4.1 LicenseService code injection (Issue 446)", "creation_timestamp": "2024-02-03T16:51:39.000000Z"}, {"uuid": "b1085405-923e-4096-88cb-008d4bfc2090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43449", "type": "seen", "source": "https://t.me/ctinow/171591", "content": "https://ift.tt/zKQGb6M\nCVE-2023-43449 Exploit", "creation_timestamp": "2024-01-23T01:16:39.000000Z"}]}