{"vulnerability": "CVE-2023-46308", "sightings": [{"uuid": "1e9eb75b-7e2a-4699-acfc-4a0189671325", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46308", "type": "seen", "source": "https://t.me/ctinow/162205", "content": "https://ift.tt/9AJISVP\nCVE-2023-46308", "creation_timestamp": "2024-01-03T06:26:39.000000Z"}, {"uuid": "e2200274-b258-412a-92b7-08e4fe0d15f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46308", "type": "seen", "source": "https://t.me/ctinow/171920", "content": "https://ift.tt/maLfy6t\nCVE-2023-46308 | plotly.js up to 2.25.1 API Call expandObjectPaths/nestedProperty code injection", "creation_timestamp": "2024-01-23T12:51:47.000000Z"}, {"uuid": "82fdf3d9-84f5-48ec-a0ae-4d8cb7650209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46308", "type": "seen", "source": "https://t.me/cibsecurity/74274", "content": "\u203c\ufe0fCVE-2023-46308\u203c\ufe0f\n\nIn Plotly plotly.js before 2.25.2, plot API calls have a risk of proto being polluted in expandObjectPaths or nestedProperty.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:32:05.000000Z"}]}