{"vulnerability": "cve-2023-4636", "sightings": [{"uuid": "3e32b293-2e5a-442c-9c79-94f2dacfeebd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46361", "type": "seen", "source": "https://t.me/cibsecurity/73208", "content": "\u203c CVE-2023-46361 \u203c\n\nArtifex Software jbig2dec v0.20 was discovered to contain a SEGV vulnerability via jbig2_error at /jbig2dec/jbig2.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T11:20:54.000000Z"}, {"uuid": "5785ca16-b2c5-4b0d-8136-e23659beab43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4636", "type": "published-proof-of-concept", "source": "https://t.me/blackcybersec/55", "content": "https://github.com/ThatNotEasy/RaspberryPI-Exploit\nhttps://github.com/ThatNotEasy/CVE-2023-4636\n\nPublished New Exploit.", "creation_timestamp": "2023-12-13T19:04:16.000000Z"}, {"uuid": "4ba8c4df-51c9-4d71-ba21-a86ec32ec5d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46369", "type": "seen", "source": "https://t.me/cibsecurity/72880", "content": "\u203c CVE-2023-46369 \u203c\n\nTenda W18E V16.01.0.8(1576) contains a stack overflow vulnerability via the portMirrorMirroredPorts parameter in the formSetNetCheckTools function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:49:30.000000Z"}, {"uuid": "671e0b2a-f207-464b-a3e2-525aeeecae12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46360", "type": "seen", "source": "https://t.me/ctinow/196713", "content": "https://ift.tt/JqnBIFL\nCVE-2023-46360 | Hardy Barth cPH2 eCharge Ladestation up to 1.87.0 unnecessary privileges", "creation_timestamp": "2024-02-29T15:21:33.000000Z"}, {"uuid": "5a3063b5-2e7a-44c1-b14b-d8cb7cd76ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4636", "type": "seen", "source": "https://t.me/cibsecurity/69812", "content": "\u203c CVE-2023-4636 \u203c\n\nThe WordPress File Sharing Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:42.000000Z"}, {"uuid": "74879b33-d5b7-4cbb-9411-6a0243f4ddee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46360", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9666", "content": "#exploit\n1. CVE-2023-46359/CVE-2023-46360:\nOS Command Injection in cPH2 Charging Station &lt;2.0\nhttps://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360\n\n2. WebKit Exploit for PS4 6.x-9.6 / PS5 1.x-5.x\nhttps://github.com/kmeps4/PSFree\n\n3. CVE-2022-28117:\nSSRF in feed_parser class of Navigate CMS v2.9.4\nhttps://github.com/kimstars/POC-CVE-2022-28117", "creation_timestamp": "2024-01-03T20:41:00.000000Z"}, {"uuid": "ac9c438b-1d32-47c4-a14e-5aff0cb5292d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46360", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2605", "content": "#exploit\n1. CVE-2023-46359/CVE-2023-46360:\nOS Command Injection in cPH2 Charging Station &lt;2.0\nhttps://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360\n\n2. WebKit Exploit for PS4 6.x-9.6 / PS5 1.x-5.x\nhttps://github.com/kmeps4/PSFree\n\n3. CVE-2022-28117:\nSSRF in feed_parser class of Navigate CMS v2.9.4\nhttps://github.com/kimstars/POC-CVE-2022-28117", "creation_timestamp": "2024-08-16T09:08:42.000000Z"}, {"uuid": "048bd2f5-fb94-46c2-a305-324b5cb9d2da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4636", "type": "published-proof-of-concept", "source": "https://t.me/DailyToolz/1080", "content": "https://github.com/ThatNotEasy/RaspberryPI-Exploit\nhttps://github.com/ThatNotEasy/CVE-2023-4636\n\nPublished New Exploit.\nJoin Us:-\n- https://t.me/blackcybersec", "creation_timestamp": "2023-12-13T19:05:47.000000Z"}, {"uuid": "cd18934f-f699-452f-99d3-c617b2995fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46360", "type": "seen", "source": "https://t.me/ctinow/179671", "content": "https://nvd.nist.gov/vuln/detail/CVE-2023-46360\nCVE-2023-46360", "creation_timestamp": "2024-02-06T02:26:44.000000Z"}]}