{"vulnerability": "CVE-2023-4640", "sightings": [{"uuid": "7847d64e-330d-4de0-bc33-08ac2950e861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2853", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46401\n\ud83d\udd39 Description: KWHotel 0.47 is vulnerable to CSV Formula Injection in the invoice adding function.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:11:10.034Z\n\ud83d\udd17 References:\n1. https://gist.github.com/6en6ar/5d39374d6ced8acbe489e0b1b932d056", "creation_timestamp": "2025-01-23T23:03:51.000000Z"}, {"uuid": "15f6cca9-88b6-4a1f-84a1-5743a14e7bb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g2dith2g", "content": "", "creation_timestamp": "2025-01-23T23:55:26.534931Z"}, {"uuid": "539aa2f4-a764-4dde-a022-b727f4f24bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "seen", "source": "https://gist.github.com/6en6ar/5d39374d6ced8acbe489e0b1b932d056", "content": "", "creation_timestamp": "2025-01-23T11:27:54.000000Z"}, {"uuid": "eca92ddb-198b-4ace-bc20-29d1106e3422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46400", "type": "seen", "source": "https://gist.github.com/6en6ar/5d39374d6ced8acbe489e0b1b932d056", "content": "", "creation_timestamp": "2025-01-23T11:27:54.000000Z"}, {"uuid": "c036687f-a547-4a01-ac23-17f6de511fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46400", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113879969329264227", "content": "", "creation_timestamp": "2025-01-23T22:13:50.947857Z"}, {"uuid": "ea5bcd13-46a4-48f8-96f4-cdc6b941066c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113879969345610175", "content": "", "creation_timestamp": "2025-01-23T22:13:51.165686Z"}, {"uuid": "5c815e76-180f-4000-ae2b-c06104497b5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46400", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvtkmssh2e", "content": "", "creation_timestamp": "2025-01-23T22:15:37.004881Z"}, {"uuid": "6d51c63b-8f49-40ae-a385-f9c180fa2f96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvtnopp52t", "content": "", "creation_timestamp": "2025-01-23T22:15:40.025933Z"}, {"uuid": "32e2d68c-5d8b-42b6-98bf-ccc0720867fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46404", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5570", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC and Writeup for CVE-2023-46404.\nURL\uff1ahttps://github.com/windecks/CVE-2023-46404\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-26T15:08:38.000000Z"}, {"uuid": "73b6149f-2457-41e6-adc7-3cd4515f3a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46400", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2854", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46400\n\ud83d\udd39 Description: KWHotel 0.47 is vulnerable to CSV Formula Injection in the add guest function.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:10:23.748Z\n\ud83d\udd17 References:\n1. https://gist.github.com/6en6ar/5d39374d6ced8acbe489e0b1b932d056", "creation_timestamp": "2025-01-23T23:03:52.000000Z"}, {"uuid": "372da45c-7a9b-4edb-bcd7-246df786c738", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "seen", "source": "https://t.me/cvedetector/16244", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-46401 - KWHotel CSV Formula Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-46401 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : KWHotel 0.47 is vulnerable to CSV Formula Injection in the invoice adding function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:26.000000Z"}, {"uuid": "9c81a469-c16f-42b7-b827-79155616547c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46400", "type": "seen", "source": "https://t.me/cvedetector/16243", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-46400 - KWHotel CSV Formula Injection Vulnerability in Add Guest Function\", \n  \"Content\": \"CVE ID : CVE-2023-46400 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : KWHotel 0.47 is vulnerable to CSV Formula Injection in the add guest function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:22.000000Z"}, {"uuid": "992ede57-186a-45fb-add9-e5c1af9a7cf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46407", "type": "seen", "source": "https://t.me/cibsecurity/73095", "content": "\u203c CVE-2023-46407 \u203c\n\nFFmpeg prior to commit bf814 was discovered to contain an out of bounds read via the dist-&gt;alphabet_size variable in the read_vlc_prefix() function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:36.000000Z"}, {"uuid": "deb631e1-8c8c-4c01-ab5e-4f329ed1ac72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46401", "type": "seen", "source": "Telegram/7C20wxPC3SAGt81yU3j3PNDrsDVa9vIaDGw_-xdLgqXfcmTN", "content": "", "creation_timestamp": "2025-02-06T02:42:30.000000Z"}, {"uuid": "929c90fc-61c5-470a-85bf-5571547d73b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46408", "type": "seen", "source": "https://t.me/arpsyndicate/2392", "content": "#ExploitObserverAlert\n\nCVE-2023-46408\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46408. TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 41DD80 function.\n\nFIRST-EPSS: 0.001920000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-04T00:52:46.000000Z"}, {"uuid": "316028b8-71fe-4397-a97f-7aff1c2146f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46408", "type": "seen", "source": "https://t.me/cibsecurity/72921", "content": "\u203c CVE-2023-46408 \u203c\n\nTOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 41DD80 function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-26T00:39:35.000000Z"}]}