{"vulnerability": "CVE-2023-46226", "sightings": [{"uuid": "6c4b0940-f98f-4f9d-9566-205bf692d873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46226\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: Remote Code Execution vulnerability in Apache IoTDB. This issue affects Apache IoTDB from 1.0.0 through 1.2.2.\n\nUsers are recommended to upgrade to version 1.3.0, which fixes the issue.\n\ud83d\udccf Published: 2024-01-15T12:30:19Z\n\ud83d\udccf Modified: 2025-02-13T19:31:37Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-46226\n2. https://github.com/apache/iotdb\n3. https://github.com/pypa/advisory-database/tree/main/vulns/apache-iotdb/PYSEC-2024-11.yaml\n4. https://lists.apache.org/thread/293b4ob65ftnfwyf62fb9zh8gwdy38hg\n5. http://www.openwall.com/lists/oss-security/2024/01/15/1", "creation_timestamp": "2025-02-13T20:15:22.000000Z"}, {"uuid": "c907d628-4a95-4cd2-9775-94e740ea9249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46226", "type": "seen", "source": "https://t.me/ctinow/168306", "content": "https://ift.tt/7ujK0nf\nCVE-2023-46226", "creation_timestamp": "2024-01-15T12:26:30.000000Z"}, {"uuid": "d8b6b878-47ea-4e4a-8311-d6574d188fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46226", "type": "seen", "source": "https://t.me/ctinow/178511", "content": "https://ift.tt/Q2Ui61V\nCVE-2023-46226 | Apache IoTDB up to 1.2.2 Privilege Escalation", "creation_timestamp": "2024-02-03T12:16:45.000000Z"}]}