{"vulnerability": "CVE-2023-46818", "sightings": [{"uuid": "a357a8bd-9c1a-4336-b292-39b48baf4bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltkpmawjzb2z", "content": "", "creation_timestamp": "2025-07-09T21:02:20.476588Z"}, {"uuid": "27a38bd4-982c-497e-9f9b-b86e4b7dc66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "6c61fe84-d83f-4fc8-9f2c-b0d04059bda4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ispconfig_lang_edit_php_code_injection.rb", "content": "", "creation_timestamp": "2025-07-09T05:55:58.000000Z"}, {"uuid": "78de90a7-e603-43ed-b083-92051878f0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/YzbpGbL1ih43JnW9bbIM91Q9MCmFYDnJfG6ZYS4qtd5wFPE", "content": "", "creation_timestamp": "2025-06-14T21:00:04.000000Z"}, {"uuid": "516fb804-d5d2-41c3-8361-e6be4f4ab1e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/34449", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2023-46818 Python3 Exploit for Backdrop CMS &lt;= 1.22.0 Authenticated Remote Command Execution (RCE)\nURL\uff1ahttps://github.com/ajdumanhug/CVE-2022-42092\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-04-27T17:55:40.000000Z"}, {"uuid": "6a5d1bfb-5ac9-40a0-ba87-92e94f27acba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/NinjaSec/290", "content": "1. https://github.com/Sachinart/CVE-2025-32432\nCheck for CVE-2025-32432 vulnerability\n#github #exploit\n\n\n2. https://github.com/helidem/CVE-2025-24054-PoC\nProof of Concept for NTLM Hash Leak via .library-ms CVE-2025-24054\n#github #poc\n\n\n3. https://github.com/ajdumanhug/CVE-2023-46818\nCVE-2023-46818 Python3 Exploit for ISPConfig &lt;= 3.2.11 PHP Code Injection\n#github #exploit\n\n\n4. https://github.com/0x6rss/CVE-2025-24071_PoC\nNTLM hash leak via .library-ms inside ZIP/RAR (CVE-2025-24071)\n#github #poc\n\n\n5. https://github.com/trickest/cve/blob/main/2022/CVE-2022-42092.md\nCVE-2022-42092 \u2013 Backdrop CMS RCE PoC\n#github #exploit\n\n\n6. https://github.com/nomi-sec/PoC-in-GitHub\nAggregated CVE Exploits and PoCs from GitHub\n#github #tool\n\n\n7. https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker\nLinux Container Escape CVE-2022-0492 vulnerability checker\n#github #exploit\n\n\n8. https://github.com/xigney/CVE-2025-24054_PoC\nAlternate NTLM Hash Leak via .library-ms CVE-2025-24054\n#github #poc\n\n\n9. https://github.com/bipbopbup/CVE-2023-46818-python-exploit\nPython PoC for CVE-2023-46818 in ISPConfig\n#github #exploit\n\n\n10. https://github.com/Marcejr117/CVE-2025-24071_PoC\nNTLM Hash Leak using .library-ms via ZIP trick (CVE-2025-24071)\n#github #poc\n\n\n11. https://github.com/Ostorlab/KEV\nKnown Exploited Vulnerabilities Detector\n#github #scanner\n\n\n12. https://github.com/edoardottt/missing-cve-nuclei-templates\nMissing CVE Detection via Nuclei Templates\n#github #scanner\n\n\n13. https://github.com/hyp3rlinx/Advisories\nZero-Day Security Advisories and Exploits by Hyp3rlinx\n#github #exploit\n\n\n14. https://github.com/Kubashok/apple-cve-repos\nApple CVE Database Links Repository\n#github #cve\n\n\n15. https://github.com/esnet/Seccubus_v2\nSeccubus Test Data for Vulnerability Scanners\n#github #tool\n\n\n16. https://github.com/skordemir/Xml2Ontology\nNessus XML Vulnerability Report Samples\n#github #data\n\n\n17. https://github.com/madirish/hector\nHector: Vulnerability Management Tool with Sample Nessus Reports\n#github #tool\n\n\n18. https://github.com/projectdiscovery/nuclei-templates/issues/8804\nNuclei Template request for ISPConfig CVE-2023-46818\n#github #scanner\n\n\n19. https://github.com/projectdiscovery/nuclei-templates/issues/12020\nNuclei Template PoC Request for CraftCMS CVE-2025-32432\n#github #scanner\n\n\n20. https://github.com/tanjiti/sec_profile\nSecurity Profile Aggregator \u2013 CVE, CISA, NVD, etc.\n#github #intel\n\n\n21. https://github.com/cube0x0/CVE-2021-1675\nPrintNightmare Exploit PoC (CVE-2021-1675 / CVE-2021-34527)\n#github #exploit\n\n22. https://github.com/Maldev-Academy/LsassHijackingViaReg\n\nInjecting DLL into LSASS at boot\n#github #tools\n\n\nOpen-source tools and proof-of-concept (PoC) repositories related to recent CVEs, exploits, and security research. These resources are valuable for educational purposes and can aid students in understanding real-world vulnerabilities and exploitation techniques.", "creation_timestamp": "2025-05-05T10:30:13.000000Z"}, {"uuid": "381a7dbf-5186-49dc-9573-04b82f54dad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/6tsNPngCJJc2PuKtjS5_37WNa-fKGq-6Vb5elS9ax5fMzMI", "content": "", "creation_timestamp": "2025-09-06T09:00:05.000000Z"}, {"uuid": "749c9beb-882f-4209-a847-85f20cc204ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/kPRwdse26OL24RRCXFgr-20UFoPAircdPCmhtViT2fQDNms", "content": "", "creation_timestamp": "2025-08-01T03:00:05.000000Z"}, {"uuid": "cf8a6cf6-ac21-47c5-aac5-ed659858f574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/Xd5Dp2K-pK8eim0GR99MlfqC5INsxluEke7iGLM_07w0WZI", "content": "", "creation_timestamp": "2025-06-25T09:00:03.000000Z"}, {"uuid": "f23ef3be-2059-4aa3-b334-d30008b43aaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "Telegram/lDzxx419LmTfyuLmsPSW31421MarDrsNh-ZW3fTm9VSStQ", "content": "", "creation_timestamp": "2023-10-27T12:26:30.000000Z"}, {"uuid": "9f69f39a-dd06-4d50-961a-dc897c099f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/ggL6AH1lRYorBCzgwro177IArqCXjxjkyvjAx2FEfC3c0Ls", "content": "", "creation_timestamp": "2025-04-13T23:00:06.000000Z"}, {"uuid": "3ccccaad-2e0c-4d47-82c5-3b429ddd720c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/3WDKzCztn6fhsFP0h502IW0gqJijz_QXvsQbayWM_ehdyuQ", "content": "", "creation_timestamp": "2025-04-14T05:00:07.000000Z"}, {"uuid": "c14f3c45-eaeb-4134-ac7f-0e318eb357ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/341xXm5UtN9QICspfpxP1D9SSpGTYEVNLbqcOtHFcgKSJEI", "content": "", "creation_timestamp": "2025-05-02T11:00:06.000000Z"}, {"uuid": "cd334e1b-13c6-46a5-a1c7-ddfe9902493d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/9584", "content": "#exploit\n1. CVE-2023-36424:\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\nhttps://ssd-disclosure.com/ssd-advisory-windows-kernel-pool-clfs-sys-corruption-privilege-escalation\n\n2. CVE-2023-46818:\nISPConfig &lt;=3.2.11 (language_edit.php) PHP Code Injection\nhttps://seclists.org/fulldisclosure/2023/Dec/2\n\n3. CVE-2023-26035:\nUnauth RCE in ZoneMinder Snapshots\nhttps://github.com/rvizx/CVE-2023-26035", "creation_timestamp": "2024-03-20T05:06:02.000000Z"}, {"uuid": "542913f8-fdfd-49e0-a5e8-abc10b7b5c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://t.me/Rootsec_2/2265", "content": "#exploit\n1. CVE-2023-36424:\nWindows Kernel Pool (clfs.sys) Corruption Privilege Escalation\nhttps://ssd-disclosure.com/ssd-advisory-windows-kernel-pool-clfs-sys-corruption-privilege-escalation\n\n2. CVE-2023-46818:\nISPConfig &lt;=3.2.11 (language_edit.php) PHP Code Injection\nhttps://seclists.org/fulldisclosure/2023/Dec/2\n\n3. CVE-2023-26035:\nUnauth RCE in ZoneMinder Snapshots\nhttps://github.com/rvizx/CVE-2023-26035", "creation_timestamp": "2024-08-16T08:56:17.000000Z"}, {"uuid": "b0c36b89-2934-48f4-8344-23f43f0a3cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/liwaamohammad/1929", "content": "https://github.com/ajdumanhug/CVE-2022-42092\n\nCVE-2023-46818 Python3 Exploit for Backdrop CMS &lt;= 1.22.0 Authenticated Remote Command Execution (RCE)\n#github #exploit", "creation_timestamp": "2025-05-02T14:06:34.000000Z"}]}