{"vulnerability": "CVE-2023-4735", "sightings": [{"uuid": "1089b999-96d7-4cab-bce1-2796c2c7a938", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47350", "type": "seen", "source": "https://t.me/arpsyndicate/2992", "content": "#ExploitObserverAlert\n\nCVE-2023-47350\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-47350. Cross-Site Request Forgery (CSRF) vulnerability in SwiftyEdit Content Management System prior to v1.2.0, allows remote attackers to escalate privileges via the user password update functionality.\n\nFIRST-EPSS: 0.000580000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-26T15:51:30.000000Z"}, {"uuid": "8898282f-5f69-451f-9491-f9d1f4e3c0f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4735", "type": "seen", "source": "https://t.me/cibsecurity/69701", "content": "\u203c CVE-2023-4735 \u203c\n\nOut-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-02T22:14:50.000000Z"}, {"uuid": "53e36908-ca5b-49a1-af81-6b05d35c85c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47353", "type": "seen", "source": "https://t.me/ctinow/196712", "content": "https://ift.tt/OuSwqM9\nCVE-2023-47353 | IMOU GO 1.0.11 com.oneed.dvr.service.DownloadFirmwareService information disclosure", "creation_timestamp": "2024-02-29T15:21:32.000000Z"}, {"uuid": "c7e9ecc3-645f-49da-a6f8-1ca51a17ab65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47354", "type": "seen", "source": "https://t.me/ctinow/196718", "content": "https://ift.tt/qhuiyfA\nCVE-2023-47354 | com.bdrm.superreboot 1.0.3 Intent PowerOffWidgetReceiver unknown vulnerability", "creation_timestamp": "2024-02-29T15:21:39.000000Z"}, {"uuid": "567fe798-e1ff-4435-becb-9911b25790b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47353", "type": "seen", "source": "https://t.me/ctinow/179673", "content": "https://ift.tt/W6R9TjQ\nCVE-2023-47353", "creation_timestamp": "2024-02-06T02:26:46.000000Z"}, {"uuid": "dde4285e-f330-4ac7-bec2-70cedf3983aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47356", "type": "seen", "source": "MISP/a3c5beab-b790-4171-8b4c-02c8a9678071", "content": "", "creation_timestamp": "2025-07-22T03:54:24.000000Z"}, {"uuid": "6bcd0f9d-8d2b-4979-8c0d-c62bb43d2159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47352", "type": "seen", "source": "https://t.me/ctinow/186190", "content": "https://ift.tt/OQUa5Vw\nCVE-2023-47352 | Technicolor TC8715D WPA2 information disclosure", "creation_timestamp": "2024-02-16T08:46:18.000000Z"}, {"uuid": "eb438b48-8e8e-4204-8887-3e8d515c9ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47353", "type": "seen", "source": "https://t.me/ctinow/184204", "content": "https://ift.tt/yJgP6qM\nCVE-2023-47353 Exploit", "creation_timestamp": "2024-02-13T21:16:55.000000Z"}, {"uuid": "8b4a1278-752b-42f1-9140-233b1b03f68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47354", "type": "seen", "source": "https://t.me/ctinow/179658", "content": "https://ift.tt/mCFuK7k\nCVE-2023-47354", "creation_timestamp": "2024-02-06T01:31:40.000000Z"}, {"uuid": "aa3e72ac-f3f4-4e55-b221-00c52ae90113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47355", "type": "seen", "source": "https://t.me/ctinow/179350", "content": "https://ift.tt/3yzEkBN\nCVE-2023-47355", "creation_timestamp": "2024-02-05T17:22:22.000000Z"}, {"uuid": "0a0af984-5fde-4335-abff-39e8fb99e49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47355", "type": "seen", "source": "https://t.me/ctinow/184057", "content": "https://ift.tt/AdTQIkp\nCVE-2023-47355 Exploit", "creation_timestamp": "2024-02-13T19:17:17.000000Z"}, {"uuid": "1f1f7a0c-5355-4cfd-b93a-57cd2eb53ce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47354", "type": "seen", "source": "https://t.me/ctinow/184207", "content": "https://ift.tt/oNv18c7\nCVE-2023-47354 Exploit", "creation_timestamp": "2024-02-13T21:16:59.000000Z"}, {"uuid": "e6791ef8-426b-4db0-a5bf-49aff3819029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47356", "type": "seen", "source": "MISP/a3c5beab-b790-4171-8b4c-02c8a9678071", "content": "", "creation_timestamp": "2025-09-09T11:53:45.000000Z"}, {"uuid": "f3f330d4-8765-4693-913d-0ce7063df2b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47359", "type": "seen", "source": "https://t.me/arpsyndicate/499", "content": "#ExploitObserverAlert\n\nCVE-2023-47359\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47359. Videolan VLC prior to version 3.0.20 contains an incorrect offset read that leads to a Heap-Based Buffer Overflow in function GetPacket() and results in a memory corruption.\n\nFIRST-EPSS: 0.000870000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-23T13:54:02.000000Z"}, {"uuid": "52b855b7-2e52-4c82-855d-9f530d2792db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47352", "type": "seen", "source": "https://t.me/ctinow/170988", "content": "https://ift.tt/2W7hcnr\nCVE-2023-47352", "creation_timestamp": "2024-01-22T06:30:27.000000Z"}]}