{"vulnerability": "cve-2023-4318", "sightings": [{"uuid": "15a111a9-8008-44fc-9133-13c447d2523b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43183", "type": "seen", "source": "https://t.me/ctinow/183581", "content": "https://ift.tt/9EQLmgJ\nCVE-2023-43183 Exploit", "creation_timestamp": "2024-02-13T03:16:28.000000Z"}, {"uuid": "c53ebd5b-3cc3-4e73-b14e-4d1d86348b6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43183", "type": "seen", "source": "https://t.me/ctinow/178467", "content": "https://ift.tt/t5Egazk\nCVE-2023-43183", "creation_timestamp": "2024-02-03T10:21:48.000000Z"}, {"uuid": "73a9d592-ca1a-4e1a-9938-04d2fc338cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43183", "type": "seen", "source": "https://t.me/ctinow/188051", "content": "https://ift.tt/uYjmpfR\nCVE-2023-43183 | Reprise License Manager 15.1 POST Parameter /change_password_process user access control (ID 176841)", "creation_timestamp": "2024-02-20T02:31:43.000000Z"}, {"uuid": "289dcf61-f6db-4433-8c58-6601f68c049a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43187", "type": "seen", "source": "https://t.me/arpsyndicate/4176", "content": "#ExploitObserverAlert\n\nPD/http/cves/2023/CVE-2023-43187\n\nDESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to PD/http/cves/2023/CVE-2023-43187. A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.", "creation_timestamp": "2024-03-13T00:26:14.000000Z"}]}