{"vulnerability": "CVE-2023-4694", "sightings": [{"uuid": "b384c455-753b-4362-ab07-3d52adb1d85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "seen", "source": "https://t.me/ctinow/156827", "content": "https://ift.tt/UmdSDcY\nCVE-2023-46944 | GitKraken GitLens up to 13.x Visual Studio Codes Workspace Trust Remote Code Execution", "creation_timestamp": "2023-12-20T09:42:30.000000Z"}, {"uuid": "ba651cb4-c374-4ee0-a624-e2b60efd5eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46947", "type": "seen", "source": "https://t.me/cibsecurity/73523", "content": "\u203c CVE-2023-46947 \u203c\n\nSubrion 4.2.1 has a remote command execution vulnerability in the backend.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-03T15:23:31.000000Z"}, {"uuid": "02651b6a-ec09-4475-8fd5-772e3812ea66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "seen", "source": "https://t.me/arpsyndicate/4723", "content": "#ExploitObserverAlert\n\nCVE-2023-46944\n\nDESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to CVE-2023-46944. An issue in GitKraken GitLens before v.14.0.0 allows an attacker to execute arbitrary code via a crafted file to the Visual Studio Codes workspace trust component.\n\nFIRST-EPSS: 0.002660000\nNVD-IS: 5.9\nNVD-ES: 1.8\nARPS-PRIORITY: 0.925636", "creation_timestamp": "2024-04-20T00:44:19.000000Z"}, {"uuid": "7a1676ee-5a31-4436-a2d8-579644bea1ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46942", "type": "seen", "source": "https://t.me/ctinow/178363", "content": "https://ift.tt/SjtqwkA\nCVE-2023-46942 | evershop up to 1.0.0-rc.7 GraphQL Endpoint information disclosure", "creation_timestamp": "2024-02-03T03:11:47.000000Z"}, {"uuid": "3ab0f4d7-9db4-420c-8a7b-6de7dedf585a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46943", "type": "seen", "source": "https://t.me/ctinow/167664", "content": "https://ift.tt/u3YmdQM\nCVE-2023-46943", "creation_timestamp": "2024-01-13T03:26:59.000000Z"}, {"uuid": "d8bc8916-ac79-4bbf-a6a3-e0cf3814654c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46942", "type": "seen", "source": "https://t.me/ctinow/167663", "content": "https://ift.tt/NQb3ABh\nCVE-2023-46942", "creation_timestamp": "2024-01-13T03:26:58.000000Z"}, {"uuid": "be8a9d33-dfd8-418d-8252-8dea5ac8387d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4694", "type": "seen", "source": "https://t.me/ctinow/166445", "content": "https://ift.tt/9xtvpiF\nCVE-2023-4694 | HP OfficeJet Pro Printer SOAP Message denial of service", "creation_timestamp": "2024-01-11T10:57:00.000000Z"}, {"uuid": "324d1f04-3e61-4f4d-b818-ac3968a65684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46943", "type": "seen", "source": "https://t.me/ctinow/178364", "content": "https://ift.tt/iX8HPnt\nCVE-2023-46943 | evershop up to 1.0.0-rc.7 JSON Web Token hard-coded key", "creation_timestamp": "2024-02-03T03:11:49.000000Z"}, {"uuid": "34ccedd9-a134-4dd6-845b-2f905b5c97ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10397", "content": "#exploit\n1. Exploiting embedded mitel phones for unauthenticated RCE\nhttps://baldur.dk/blog/embedded-mitel-exploitation.html\n\n2. CVE-2023-46944:\nGitLens Git Local Configuration Execution\nhttps://packetstormsecurity.com/files/178227/GitLens-Git-Local-Configuration-Execution.html", "creation_timestamp": "2024-04-25T21:13:27.000000Z"}, {"uuid": "4aed9230-9fd1-4c57-90e8-e90cd9d30724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "e55de160-604a-40b5-bcde-ac498a961b7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:57.000000Z"}, {"uuid": "19694c13-a57e-459b-98f4-b14846630a89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "d474f2f4-291d-49b9-ba8c-40382c9b4302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46948", "type": "seen", "source": "https://t.me/cvedetector/6205", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-46948 - Temenos T24 Browser Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-46948 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : A reflected Cross-Site Scripting (XSS) vulnerability was found on Temenos T24 Browser R19.40 that enables a remote attacker to execute arbitrary JavaScript code via the skin parameter in the about.jsp and genrequest.jsp components. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:22.000000Z"}, {"uuid": "98dab64b-5260-485c-9e8f-c94c92ed1215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "published-proof-of-concept", "source": "Telegram/5RzZThABtc3-5B98SUnEBQBcvljqUGOHkKcDCf1Ry7zqyK4", "content": "", "creation_timestamp": "2024-06-05T05:24:55.000000Z"}, {"uuid": "13a7069c-46e5-4f6f-9990-c5a6c28ac50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46944", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/fileformat/gitlens_local_config_exec.rb", "content": "", "creation_timestamp": "2024-04-19T00:45:19.000000Z"}]}