{"vulnerability": "CVE-2023-4395", "sightings": [{"uuid": "045b4a34-33b6-48ba-be54-7a021a2a3653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/arpsyndicate/2271", "content": "#ExploitObserverAlert\n\nCVE-2023-43955\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-43955. The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.", "creation_timestamp": "2023-12-31T01:57:36.000000Z"}, {"uuid": "2d8cdd5b-155c-4743-973e-ba74ad0f1370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/arpsyndicate/2961", "content": "#ExploitObserverAlert\n\nCVE-2023-43955\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-43955. The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.\n\nFIRST-EPSS: 0.002610000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-20T14:03:19.000000Z"}, {"uuid": "fa54a134-0517-4bfc-92ce-299266f762dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43958", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388061922471970", "content": "", "creation_timestamp": "2025-04-23T15:48:33.834501Z"}, {"uuid": "495527da-2f30-452a-96fe-8ca2e80ce426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43952", "type": "seen", "source": "https://t.me/cibsecurity/71536", "content": "\u203c CVE-2023-43952 \u203c\n\nSSCMS 7.2.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Material Management component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T00:24:40.000000Z"}, {"uuid": "ce55ee5b-7133-4338-a7cb-b0368c2a45f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43959", "type": "seen", "source": "https://t.me/cibsecurity/72439", "content": "\u203c CVE-2023-43959 \u203c\n\nAn issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T18:33:13.000000Z"}, {"uuid": "1f35a008-b2c7-4de3-99b6-482d1a0bbc51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43951", "type": "seen", "source": "https://t.me/cibsecurity/71535", "content": "\u203c CVE-2023-43951 \u203c\n\nSSCMS 7.2.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Column Management component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T00:24:39.000000Z"}, {"uuid": "a242595c-2aec-42a2-9777-944eb6cb8cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43953", "type": "seen", "source": "https://t.me/cibsecurity/71527", "content": "\u203c CVE-2023-43953 \u203c\n\nSSCMS 7.2.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Content Management component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T00:24:28.000000Z"}, {"uuid": "7730cf41-6799-4fdd-9304-31460bd0e610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/ctinow/159796", "content": "https://ift.tt/tTuf8bH\nCVE-2023-43955", "creation_timestamp": "2023-12-27T22:26:20.000000Z"}, {"uuid": "439c88a0-4b09-462c-820b-949dea4f65d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43956", "type": "seen", "source": "https://t.me/ctinow/170416", "content": "https://ift.tt/G2Hn1Qq\nCVE-2023-43956", "creation_timestamp": "2024-01-19T21:27:25.000000Z"}, {"uuid": "91afda70-9ff2-4ec7-9f46-2cf2408ce685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/ctinow/165422", "content": "https://ift.tt/JvCjen3\nCVE-2023-43955 Exploit", "creation_timestamp": "2024-01-09T23:17:27.000000Z"}]}