{"vulnerability": "CVE-2023-4769", "sightings": [{"uuid": "bc9a0c71-e9ab-4ab6-a552-354915f887ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47693", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2nsj3ir2o", "content": "", "creation_timestamp": "2025-01-02T12:18:06.450035Z"}, {"uuid": "a138fcbb-5819-4049-825d-76ad1f4ebcfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47692", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2npz3tj2l", "content": "", "creation_timestamp": "2025-01-02T12:18:04.137011Z"}, {"uuid": "aa2cea4d-3a15-47c0-abaa-a8c486c97e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47692", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759564299646704", "content": "", "creation_timestamp": "2025-01-02T15:53:16.010088Z"}, {"uuid": "68e8581f-f614-48d9-8595-c9260fcd6c01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47693", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113759564333327586", "content": "", "creation_timestamp": "2025-01-02T15:53:16.507956Z"}, {"uuid": "9598f03e-13b6-4c86-a0b8-3eaa1f5541c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47691", "type": "seen", "source": "https://t.me/ctinow/202482", "content": "https://ift.tt/M3LZCp4\nCVE-2023-47691", "creation_timestamp": "2024-03-07T15:32:12.000000Z"}, {"uuid": "c2224604-b211-4f75-9bdf-6e1a2f454eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47691", "type": "seen", "source": "https://t.me/ctinow/202479", "content": "https://ift.tt/M3LZCp4\nCVE-2023-47691", "creation_timestamp": "2024-03-07T15:26:14.000000Z"}, {"uuid": "1c64398f-a4b4-48a6-b891-a4f5ae40cd61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4769", "type": "seen", "source": "https://t.me/cibsecurity/73509", "content": "\u203c CVE-2023-4769 \u203c\n\nA SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-03T13:23:18.000000Z"}, {"uuid": "e1b33482-7218-43d0-8a8f-6b3a8a85c58f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47699", "type": "seen", "source": "https://t.me/ctinow/208959", "content": "https://ift.tt/g6huXBs\nCVE-2023-47699", "creation_timestamp": "2024-03-15T17:26:46.000000Z"}, {"uuid": "ef63354f-1d58-4be6-b39b-a6c5a8d2c260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47699", "type": "seen", "source": "https://t.me/ctinow/208948", "content": "https://ift.tt/g6huXBs\nCVE-2023-47699", "creation_timestamp": "2024-03-15T17:26:33.000000Z"}]}