{"vulnerability": "cve-2023-4713", "sightings": [{"uuid": "75a95301-1ae0-45d7-abd9-de7f03e0e362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47131", "type": "seen", "source": "https://t.me/ctinow/198438", "content": "https://ift.tt/vHozNBQ\nCVE-2023-47131 | N-able PassPortal Extension up to 3.29.1 on Chrome log file", "creation_timestamp": "2024-03-02T18:21:47.000000Z"}, {"uuid": "0778c512-b36e-4020-8fc8-010991e9c933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47132", "type": "seen", "source": "https://t.me/ctinow/198430", "content": "https://ift.tt/jB3hTE8\nCVE-2023-47132 | N-able N-central prior 2023.6 API Privilege Escalation", "creation_timestamp": "2024-03-02T17:41:41.000000Z"}, {"uuid": "1fe48388-d948-45a7-a026-8227c664ce1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47132", "type": "seen", "source": "https://t.me/ctinow/181726", "content": "https://ift.tt/eJ78IA9\nCVE-2023-47132", "creation_timestamp": "2024-02-09T00:26:28.000000Z"}, {"uuid": "c2f395d9-58d6-4eb2-a804-272d3e77ee82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47131", "type": "seen", "source": "https://t.me/ctinow/181725", "content": "https://ift.tt/h8BsLli\nCVE-2023-47131", "creation_timestamp": "2024-02-09T00:26:27.000000Z"}, {"uuid": "36a99c10-645a-45e8-9a7b-1fd98a73bb2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-47132", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18102", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-47132\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue discovered in N-able N-central before 2023.6 and earlier allows attackers to gain escalated privileges via API calls.\n\ud83d\udccf Published: 2024-02-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-11T17:06:42.163Z\n\ud83d\udd17 References:\n1. https://me.n-able.com/s/security-advisory/aArHs000000M8CHKA0/cve202347132-ncentral-api-privilege-escalation", "creation_timestamp": "2025-06-11T17:34:30.000000Z"}, {"uuid": "ff74491a-6221-408d-9266-52d8eb7de288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4713", "type": "seen", "source": "https://t.me/cibsecurity/69691", "content": "\u203c CVE-2023-4713 \u203c\n\nA vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects the function addComment of the file ?r=weibo/comment/addcomment. The manipulation of the argument touid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238576. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-03T03:35:54.000000Z"}]}