{"vulnerability": "CVE-2023-4668", "sightings": [{"uuid": "57a69801-fa25-467a-9f2a-22ea92a04853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46685", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/5520", "content": "\u200aCVE-2023-46685 (CVSS 9.8) Leaves LevelOne Routers Open to Hackers, No Patch\n\nhttps://securityonline.info/cve-2023-46685-cvss-9-8-leaves-levelone-routers-open-to-hackers-no-patch/", "creation_timestamp": "2024-07-10T10:17:47.000000Z"}, {"uuid": "8b480a0b-5af5-4418-ad25-91210c78403a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46683", "type": "seen", "source": "https://t.me/ctinow/197540", "content": "https://ift.tt/uY5qJxt\nCVE-2023-46683 | TP-Link ER7206 Omada Gigabit VPN Router 1.3.0 Build 20230322 Rel.70591 Wireguard VPN os command injection (TALOS-2023-1857)", "creation_timestamp": "2024-03-01T12:11:04.000000Z"}, {"uuid": "5e209c1e-1e62-4496-b8d3-d466022a825e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4668", "type": "seen", "source": "https://t.me/cibsecurity/72673", "content": "\u203c CVE-2023-4668 \u203c\n\nThe Ad Inserter for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.30 via the ai-debug-processing-fe URL parameter. This can allow unauthenticated attackers to extract sensitive data including installed plugins (present and active), active theme, various plugin settings, WordPress version, as well as some server settings such as memory limit, installation paths.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-20T12:41:13.000000Z"}, {"uuid": "f9967795-68f5-439c-bf95-3362ad57ae97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46687", "type": "seen", "source": "https://t.me/ctinow/190531", "content": "https://ift.tt/WnsxDoP\nCVE-2023-46687 | Emerson Rosemount GC370XA 4.1.5 command injection (icsa-24-030-01)", "creation_timestamp": "2024-02-22T08:37:21.000000Z"}, {"uuid": "945d9c33-61c8-4426-83bb-31e095bcd024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46683", "type": "seen", "source": "https://t.me/ctinow/180203", "content": "https://ift.tt/WSLju0y\nCVE-2023-46683", "creation_timestamp": "2024-02-06T18:26:54.000000Z"}, {"uuid": "0d42665a-acc1-45e1-9f25-2a2720f85b38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46683", "type": "seen", "source": "https://t.me/ctinow/181845", "content": "https://ift.tt/naYpSfJ\nCVE-2023-46683 Exploit", "creation_timestamp": "2024-02-09T08:16:38.000000Z"}, {"uuid": "4453cf80-7b30-4ab4-b6fd-69052929de5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46687", "type": "seen", "source": "https://t.me/ctinow/181807", "content": "https://ift.tt/XRtVkhj\nCVE-2023-46687", "creation_timestamp": "2024-02-09T05:31:19.000000Z"}, {"uuid": "873ea205-3764-473d-8dbe-00a62c7018ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46688", "type": "seen", "source": "https://t.me/ctinow/160802", "content": "https://ift.tt/CfX0HYI\nCVE-2023-46688 | Implem Pleasanter up to 1.3.47.0 URL redirect", "creation_timestamp": "2023-12-30T08:36:20.000000Z"}, {"uuid": "3ae14307-72e4-4c7f-b803-331f4708d2a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46686", "type": "seen", "source": "https://t.me/ctinow/167242", "content": "https://ift.tt/xJz74DP\nCVE-2023-46686 | Gallagher Command Centre Diagnostics Service up to 1.3.0 unknown vulnerability", "creation_timestamp": "2024-01-12T13:46:36.000000Z"}, {"uuid": "c232d10d-52d3-42fc-a979-0be6cf056487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46681", "type": "seen", "source": "https://t.me/ctinow/159282", "content": "https://ift.tt/gNj5OvM\nCVE-2023-46681", "creation_timestamp": "2023-12-26T09:26:48.000000Z"}]}