{"vulnerability": "CVE-2023-4716", "sightings": [{"uuid": "d5c0077e-75ba-4ac1-a6a7-008165f19ef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47160", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej7rgb42y", "content": "", "creation_timestamp": "2025-02-19T18:06:42.979283Z"}, {"uuid": "ee9c2447-70ea-4cb7-943a-b2ab3aee6f9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47160", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114032281394614424", "content": "", "creation_timestamp": "2025-02-19T19:48:49.648127Z"}, {"uuid": "fd2c7c29-ee3a-496d-9767-6cf025878a8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47160", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "cb437d26-1aeb-4367-aac7-40798c39bf2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47160", "type": "seen", "source": "https://t.me/cvedetector/18460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-47160 - IBM Cognos Controller XXE Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-47160 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0   \n  \n  \n  \n  \n  \nis vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:04.000000Z"}, {"uuid": "bcdd8831-387e-4232-a954-882cdb0ed6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47168", "type": "seen", "source": "https://t.me/ctinow/155476", "content": "https://ift.tt/i4WGnec\nCVE-2023-47168 | Mattermost up to 7.8.12/8.1.3/9.0.1/9.1.0 Custom URL Scheme mobile_login redirect_to", "creation_timestamp": "2023-12-16T20:52:15.000000Z"}, {"uuid": "6e4d3112-12de-4327-9bce-49ab1329ffed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47162", "type": "seen", "source": "https://t.me/ctinow/208912", "content": "https://ift.tt/dLTR2MP\nCVE-2023-47162", "creation_timestamp": "2024-03-15T16:26:25.000000Z"}, {"uuid": "e9c92c3a-6e54-4e5f-8ebd-fc18c407a9e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47162", "type": "seen", "source": "https://t.me/ctinow/208902", "content": "https://ift.tt/dLTR2MP\nCVE-2023-47162", "creation_timestamp": "2024-03-15T16:21:48.000000Z"}, {"uuid": "af5d023a-b343-462d-9196-195b5e061c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47167", "type": "seen", "source": "https://t.me/ctinow/197541", "content": "https://ift.tt/Iu9Oywh\nCVE-2023-47167 | TP-Link ER7206 Omada Gigabit VPN Router 1.3.0 Build 20230322 Rel.70591 GRE Policy os command injection (TALOS-2023-1855)", "creation_timestamp": "2024-03-01T12:11:05.000000Z"}, {"uuid": "74d61e16-9db3-4609-8e2b-e7102b84b0b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47167", "type": "seen", "source": "https://t.me/ctinow/180204", "content": "https://ift.tt/qdVnkAv\nCVE-2023-47167", "creation_timestamp": "2024-02-06T18:26:55.000000Z"}, {"uuid": "5a14143b-e94a-460f-8ba7-440ae0c104db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47167", "type": "seen", "source": "https://t.me/ctinow/181844", "content": "https://ift.tt/jR1BCq5\nCVE-2023-47167 Exploit", "creation_timestamp": "2024-02-09T08:16:37.000000Z"}, {"uuid": "a65164a8-e813-4113-962e-7a32f9f0133e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47161", "type": "seen", "source": "https://t.me/ctinow/167780", "content": "https://ift.tt/YiwFSuX\nCVE-2023-47161 | IBM UrbanCode Deploy up to 7.1.2.14/7.2.3.7/7.3.2.2 Archive File input validation (XFDB-270799)", "creation_timestamp": "2024-01-13T10:21:32.000000Z"}]}