{"vulnerability": "CVE-2023-4719", "sightings": [{"uuid": "24ae5bc0-8b46-4927-badb-06e48c76cf56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47191", "type": "seen", "source": "https://t.me/ctinow/157938", "content": "https://ift.tt/SMEFcPe\nCVE-2023-47191", "creation_timestamp": "2023-12-21T20:22:35.000000Z"}, {"uuid": "1f080b36-199c-4144-8a4c-5bc3f90dc4c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47198", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18326", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47198\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations.\n\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThis vulnerability is similar to, but not identical to, CVE-2023-47199.\n\ud83d\udccf Published: 2024-01-23T20:37:56.639Z\n\ud83d\udccf Modified: 2025-06-13T19:08:30.949Z\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/dcx/s/solution/000295652?language=en_US\n2. https://www.zerodayinitiative.com/advisories/ZDI-23-1619/", "creation_timestamp": "2025-06-13T19:34:57.000000Z"}, {"uuid": "50d34914-bd5a-4f3a-8ac4-fb489e96abe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47199", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18326", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47198\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations.\n\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThis vulnerability is similar to, but not identical to, CVE-2023-47199.\n\ud83d\udccf Published: 2024-01-23T20:37:56.639Z\n\ud83d\udccf Modified: 2025-06-13T19:08:30.949Z\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/dcx/s/solution/000295652?language=en_US\n2. https://www.zerodayinitiative.com/advisories/ZDI-23-1619/", "creation_timestamp": "2025-06-13T19:34:57.000000Z"}, {"uuid": "fb00e2fe-1dda-4ce6-837c-c43bb041b93f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47192", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47192\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An agent link vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations.\n\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\ud83d\udccf Published: 2024-01-23T20:36:34.790Z\n\ud83d\udccf Modified: 2025-06-17T16:13:44.095Z\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/dcx/s/solution/000295652?language=en_US\n2. https://www.zerodayinitiative.com/advisories/ZDI-23-1611/", "creation_timestamp": "2025-06-17T16:41:06.000000Z"}, {"uuid": "278c9c2e-abec-44b9-acd6-f840d31fba81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47199", "type": "seen", "source": "https://t.me/ctinow/172358", "content": "https://ift.tt/B8lyVW3\nCVE-2023-47199", "creation_timestamp": "2024-01-23T22:27:15.000000Z"}, {"uuid": "4105ce68-3db8-4832-b892-ea3251afd4ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47198", "type": "seen", "source": "https://t.me/ctinow/172357", "content": "https://ift.tt/HiTYOv4\nCVE-2023-47198", "creation_timestamp": "2024-01-23T22:27:11.000000Z"}, {"uuid": "385322c6-4356-44a0-b42b-93d87e45a68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47196", "type": "seen", "source": "https://t.me/ctinow/172355", "content": "https://ift.tt/31AX0iY\nCVE-2023-47196", "creation_timestamp": "2024-01-23T22:27:09.000000Z"}, {"uuid": "a74976b2-1ecf-4477-8ade-6b5ccde65df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47197", "type": "seen", "source": "https://t.me/ctinow/172356", "content": "https://ift.tt/y0setgW\nCVE-2023-47197", "creation_timestamp": "2024-01-23T22:27:10.000000Z"}, {"uuid": "a52f0c46-2b0c-4c4e-9550-1a74c75d4a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47195", "type": "seen", "source": "https://t.me/ctinow/172354", "content": "https://ift.tt/0UZvB9k\nCVE-2023-47195", "creation_timestamp": "2024-01-23T22:27:08.000000Z"}, {"uuid": "24726eb4-9df0-4fcb-98a1-708388b8835e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47191", "type": "seen", "source": "https://t.me/ctinow/168052", "content": "https://ift.tt/gDAxJfc\nCVE-2023-47191 | KaineLabs Youzify Plugin up to 1.2.2 on WordPress authorization", "creation_timestamp": "2024-01-14T15:12:12.000000Z"}, {"uuid": "3c640d51-df59-4a69-b488-77ed8bfa8b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47194", "type": "seen", "source": "https://t.me/ctinow/172353", "content": "https://ift.tt/MHnULhG\nCVE-2023-47194", "creation_timestamp": "2024-01-23T22:27:07.000000Z"}, {"uuid": "660587b7-59a5-4a9d-90c9-115db7b5d889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47193", "type": "seen", "source": "https://t.me/ctinow/172352", "content": "https://ift.tt/fUlbHn8\nCVE-2023-47193", "creation_timestamp": "2024-01-23T22:27:03.000000Z"}, {"uuid": "ff2f8fb5-e435-4c56-842b-ec5e8265e52a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47192", "type": "seen", "source": "https://t.me/ctinow/172351", "content": "https://ift.tt/MLxstn3\nCVE-2023-47192", "creation_timestamp": "2024-01-23T22:27:02.000000Z"}]}