{"vulnerability": "CVE-2023-4801", "sightings": [{"uuid": "90f39ba5-af9e-422b-99e0-1be090a85f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48010", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601960047149330", "content": "", "creation_timestamp": "2024-12-05T19:52:25.898160Z"}, {"uuid": "199dfde0-99b3-4ba5-a1c5-0b8bfd59ee77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48010", "type": "seen", "source": "https://t.me/cvedetector/12138", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-48010 - STMicroelectronics SPC58 is vulnerable to Missing\", \n  \"Content\": \"CVE ID : CVE-2023-48010 \nPublished : Dec. 5, 2024, 8:15 p.m. | 41\u00a0minutes ago \nDescription : STMicroelectronics SPC58 is vulnerable to Missing Protection Mechanism for Alternate Hardware Interface. Code running as Supervisor on the SPC58 PowerPC microcontrollers may disable the System Memory Protection Unit and gain unabridged read/write access to protected assets. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T22:03:20.000000Z"}, {"uuid": "1575c055-8d57-4b92-9584-c299cb8a7174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48013", "type": "seen", "source": "https://t.me/arpsyndicate/4550", "content": "#ExploitObserverAlert\n\nCVE-2023-48013\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-48013. GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.\n\nFIRST-EPSS: 0.000530000\nNVD-IS: 5.9\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.5935014", "creation_timestamp": "2024-04-12T07:15:14.000000Z"}, {"uuid": "aad0853a-a8af-4a0b-bf30-0b39f3524a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48014", "type": "seen", "source": "https://t.me/arpsyndicate/4546", "content": "#ExploitObserverAlert\n\nCVE-2023-48014\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-48014. GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.\n\nFIRST-EPSS: 0.000530000\nNVD-IS: 5.9\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.5935014", "creation_timestamp": "2024-04-12T06:57:57.000000Z"}, {"uuid": "1136277d-db43-4686-b2c5-723db1a50260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48011", "type": "seen", "source": "https://t.me/arpsyndicate/4541", "content": "#ExploitObserverAlert\n\nCVE-2023-48011\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-48011. GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.\n\nFIRST-EPSS: 0.000530000\nNVD-IS: 5.9\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.5935014", "creation_timestamp": "2024-04-12T06:35:20.000000Z"}, {"uuid": "6ff7cf40-751b-4b56-af18-9620b69cbd34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4801", "type": "seen", "source": "https://t.me/cibsecurity/70402", "content": "\u203c CVE-2023-4801 \u203c\n\nAn improper certification validation vulnerability in the Insider Threat Management (ITM) Agent for MacOS could be used by an anonymous actor on an adjacent network to establish a man-in-the-middle position between the agent and the ITM server after the agent has registered. All versions prior to 7.14.3.69 are affected. Agents for Windows, Linux, and Cloud are unaffected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T20:23:50.000000Z"}, {"uuid": "e3182a75-7376-4862-9954-8da5caa1615e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48016", "type": "seen", "source": "https://t.me/ctinow/157698", "content": "https://ift.tt/LtFyCfp\nCVE-2023-48016 | Restaurant Table Booking System 1.0 rtbs/admin/index.php username sql injection", "creation_timestamp": "2023-12-21T14:11:46.000000Z"}]}