{"vulnerability": "CVE-2023-46715", "sightings": [{"uuid": "394db554-42af-42d8-9990-f335bb2ccdcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827178004578867", "content": "", "creation_timestamp": "2025-01-14T14:28:19.281942Z"}, {"uuid": "846957e6-d275-4df9-924c-45c7e74c3f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113827196329836553", "content": "", "creation_timestamp": "2025-01-14T14:32:58.961264Z"}, {"uuid": "778545c1-9d50-4887-bbae-46e603f488dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:34.263166Z"}, {"uuid": "3e31da5b-dcbc-44a2-aef6-2e91e363a3b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpgubkfzg2f", "content": "", "creation_timestamp": "2025-01-14T14:16:20.581305Z"}, {"uuid": "83367338-5f0f-4e73-80f0-e4e62a91f725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1612", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46715\n\ud83d\udd39 Description: An origin validation error [CWE-346] vulnerability in Fortinet FortiOS  IPSec VPN version 7.4.0 through 7.4.1 and version 7.2.6 and below allows an authenticated IPSec VPN user with dynamic IP addressing to send (but not receive) packets spoofing the IP of another user via crafted network packets.\n\ud83d\udccf Published: 2025-01-14T14:08:52.045Z\n\ud83d\udccf Modified: 2025-01-14T20:55:58.030Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/psirt/FG-IR-23-407", "creation_timestamp": "2025-01-14T21:11:12.000000Z"}, {"uuid": "b28bd46d-013d-465e-82b3-8f7f7a5ab2a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46715", "type": "seen", "source": "Telegram/I1quVnVlqFepLuQe0ihpyEIKeV_4Wpekcklkqln85-0cxGs5", "content": "", "creation_timestamp": "2025-02-01T17:28:11.000000Z"}]}