{"vulnerability": "CVE-2023-40383", "sightings": [{"uuid": "fb88ee0f-5485-4b0f-b25e-f562d41ebf34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40383", "type": "seen", "source": "https://t.me/ctinow/175836", "content": "https://ift.tt/HIPYvRs\nCVE-2023-40383 | Apple macOS up to 13.2 App path traversal", "creation_timestamp": "2024-01-30T11:16:21.000000Z"}, {"uuid": "9c8b591a-84f0-4cd2-8578-7f1c88c8a13a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40383", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18641", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40383\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data.\n\ud83d\udccf Published: 2024-01-10T22:03:41.602Z\n\ud83d\udccf Modified: 2025-06-17T17:05:10.794Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213670", "creation_timestamp": "2025-06-17T17:42:22.000000Z"}, {"uuid": "b4733ee1-28c1-4265-bed1-e50573b369e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40383", "type": "seen", "source": "https://t.me/ctinow/166214", "content": "https://ift.tt/3WNi2Y4\nCVE-2023-40383", "creation_timestamp": "2024-01-10T23:26:42.000000Z"}]}