{"vulnerability": "CVE-2023-47256", "sightings": [{"uuid": "c82e223d-a103-4433-a92a-0f67eb62e9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47256", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18612", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47256\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings\n\ud83d\udccf Published: 2024-02-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-17T16:16:50.199Z\n\ud83d\udd17 References:\n1. https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.8-security-fix\n2. https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256", "creation_timestamp": "2025-06-17T16:41:03.000000Z"}, {"uuid": "b6e3e007-0410-41b9-bad8-b63b81748c2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47256", "type": "seen", "source": "https://t.me/ctinow/177820", "content": "https://ift.tt/PgQm1yE\nCVE-2023-47256", "creation_timestamp": "2024-02-01T23:26:32.000000Z"}, {"uuid": "45e7d697-7efd-402f-86d0-874b4b45b929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47256", "type": "seen", "source": "https://t.me/ctinow/192626", "content": "https://ift.tt/ASfVQHj\nCVE-2023-47256 | ConnectWise ScreenConnect up to 23.8.4 Proxy Setting access control", "creation_timestamp": "2024-02-24T15:16:55.000000Z"}]}