{"vulnerability": "CVE-2023-4671", "sightings": [{"uuid": "394db554-42af-42d8-9990-f335bb2ccdcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827178004578867", "content": "", "creation_timestamp": "2025-01-14T14:28:19.281942Z"}, {"uuid": "846957e6-d275-4df9-924c-45c7e74c3f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113827196329836553", "content": "", "creation_timestamp": "2025-01-14T14:32:58.961264Z"}, {"uuid": "778545c1-9d50-4887-bbae-46e603f488dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:34.263166Z"}, {"uuid": "3e31da5b-dcbc-44a2-aef6-2e91e363a3b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpgubkfzg2f", "content": "", "creation_timestamp": "2025-01-14T14:16:20.581305Z"}, {"uuid": "44e9ff74-6fdf-4f7e-b3b4-04489b3ed07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46716", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loiajo5hid2w", "content": "", "creation_timestamp": "2025-05-06T06:21:12.895452Z"}, {"uuid": "83367338-5f0f-4e73-80f0-e4e62a91f725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1612", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46715\n\ud83d\udd39 Description: An origin validation error [CWE-346] vulnerability in Fortinet FortiOS  IPSec VPN version 7.4.0 through 7.4.1 and version 7.2.6 and below allows an authenticated IPSec VPN user with dynamic IP addressing to send (but not receive) packets spoofing the IP of another user via crafted network packets.\n\ud83d\udccf Published: 2025-01-14T14:08:52.045Z\n\ud83d\udccf Modified: 2025-01-14T20:55:58.030Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/psirt/FG-IR-23-407", "creation_timestamp": "2025-01-14T21:11:12.000000Z"}, {"uuid": "4e3886b4-a3a8-4a44-9aa6-0ccd2ee44f83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46716", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46716\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-05-06T02:55:09.134Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-05-06T03:19:59.000000Z"}, {"uuid": "b28bd46d-013d-465e-82b3-8f7f7a5ab2a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "Telegram/I1quVnVlqFepLuQe0ihpyEIKeV_4Wpekcklkqln85-0cxGs5", "content": "", "creation_timestamp": "2025-02-01T17:28:11.000000Z"}, {"uuid": "f51e665e-095b-4370-8f2f-c4613060a59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46714", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1116", "content": "(CVE-2023-46714) TOTOLINK X6000R v9.4.0cu.652_B20230116 \u06a9\u0634\u0641 \u0634\u062f \u06a9\u0647 \u0634\u0627\u0645\u0644 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0627\u0628\u0639 sub_41D494 \u0627\u0633\u062a. \u0644\u06cc\u0646\u06a9: https://www.fortiguard.com/psirt/FG-IR-23-415\n\n(CVE-2023-46714) TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ 41D494 function.\nLink: https://www.fortiguard.com/psirt/FG-IR-23-415", "creation_timestamp": "2024-05-16T05:52:11.000000Z"}, {"uuid": "c87a3785-8b2b-401b-99c3-67a2071bbe51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46717", "type": "seen", "source": "https://t.me/ctinow/205820", "content": "https://ift.tt/1VPwJ8r\nCVE-2023-46717", "creation_timestamp": "2024-03-12T16:32:06.000000Z"}, {"uuid": "a8b44ab7-5423-4c0f-92a2-b2f82e03f60e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46717", "type": "seen", "source": "https://t.me/ctinow/205804", "content": "https://ift.tt/1VPwJ8r\nCVE-2023-46717", "creation_timestamp": "2024-03-12T16:26:37.000000Z"}, {"uuid": "a9ec97e7-ce5a-4b93-9ee8-63a993e03a8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4671", "type": "seen", "source": "https://t.me/ctinow/170575", "content": "https://ift.tt/OURLIEj\nCVE-2023-4671 | Talent ECOP prior 32255 Command Line sql injection", "creation_timestamp": "2024-01-20T10:11:13.000000Z"}, {"uuid": "75a68171-af4d-4a00-92ec-8ba5d0a4f19a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46712", "type": "seen", "source": "https://t.me/ctinow/174995", "content": "https://ift.tt/qDT62Xh\nCVE-2023-46712 | Fortinet FortiPortal up to 7.0.6/7.2.1 HTTP Request access control (FG-IR-23-395)", "creation_timestamp": "2024-01-28T18:31:59.000000Z"}, {"uuid": "87a5c1c7-080c-413b-ade1-d3e50f868507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46711", "type": "seen", "source": "https://t.me/ctinow/170131", "content": "https://ift.tt/VWiqPCZ\nCVE-2023-46711 | Buffalo VR-S1000 up to 2.37 hard-coded key", "creation_timestamp": "2024-01-19T10:16:42.000000Z"}, {"uuid": "89533590-0bec-445c-96af-b7d59287e046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46712", "type": "seen", "source": "https://t.me/ctinow/166075", "content": "https://ift.tt/KJn1wGb\nCVE-2023-46712", "creation_timestamp": "2024-01-10T19:26:13.000000Z"}, {"uuid": "a59d5a7a-1c53-46ce-a242-2285e5599bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4671", "type": "seen", "source": "https://t.me/ctinow/159997", "content": "https://ift.tt/yUX6B5o\nCVE-2023-4671", "creation_timestamp": "2023-12-28T11:26:37.000000Z"}, {"uuid": "5d10719e-6d0d-415e-898b-02be4bfb1cf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46711", "type": "seen", "source": "https://t.me/ctinow/159284", "content": "https://ift.tt/4jOsGqB\nCVE-2023-46711", "creation_timestamp": "2023-12-26T09:26:53.000000Z"}, {"uuid": "865a424f-aa8f-4774-b7b3-430d1c36388e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46716", "type": "seen", "source": "https://t.me/cvedetector/24556", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-46716 - Apache HTTP Server Cross-Site Request Forgery\", \n  \"Content\": \"CVE ID : CVE-2023-46716 \nPublished : May 6, 2025, 4:16 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T08:37:29.000000Z"}]}