{"vulnerability": "CVE-2023-4347", "sightings": [{"uuid": "3e269b05-fd34-4980-8325-a0cbf3cf1710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43477", "type": "seen", "source": "https://t.me/cibsecurity/70802", "content": "\u203c CVE-2023-43477 \u203c\n\nThe ping_from parameter of ping_tracerte.cgi in the web UI of Telstra Smart Modem Gen 2 (Arcadyan LH1000), firmware versions &lt; 0.18.15r, was not properly sanitized before being used in a system call, which could allow an authenticated attacker to achieve command injection as root on the device.\u00c2\u00a0\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-02T11:03:19.000000Z"}, {"uuid": "dd01c77e-853b-4f7b-9d0d-5289ce89b3b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43472", "type": "seen", "source": "https://t.me/ctinow/158837", "content": "https://ift.tt/nrocQBC\nCVE-2023-43472 | MLFlow up to 2.8.1 REST API information disclosure", "creation_timestamp": "2023-12-23T15:21:52.000000Z"}, {"uuid": "e6a44f6e-2775-4ccf-a824-d2902ff96e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4347", "type": "seen", "source": "https://t.me/cibsecurity/68528", "content": "\u203c CVE-2023-4347 \u203c\n\nCross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms prior to 23.8.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T08:01:01.000000Z"}]}