{"vulnerability": "cve-2023-4516", "sightings": [{"uuid": "fc2b2119-6203-47ca-965d-6ff938c9e7c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45165", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12346", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45165\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM AIX 7.2 and 7.3 could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service.  IBM X-Force ID:  267963.\n\ud83d\udccf Published: 2023-12-22T15:51:40.490Z\n\ud83d\udccf Modified: 2025-04-17T20:29:20.544Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7100970\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/267963", "creation_timestamp": "2025-04-17T20:58:13.000000Z"}, {"uuid": "098cc2ad-43d1-4ec7-82f9-8521af6cf047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45165", "type": "seen", "source": "https://bsky.app/profile/ransomnews.online/post/3m4zrqbw2ll2c", "content": "", "creation_timestamp": "2025-11-07T09:37:03.426223Z"}, {"uuid": "bb53f6da-bfe5-43b8-aaa4-3be647856421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45163", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16960", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45163\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI\n\ud83d\udccf Published: 2023-11-06T12:19:20.662Z\n\ud83d\udccf Modified: 2025-05-20T08:23:03.191Z\n\ud83d\udd17 References:\n1. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2005/\n2. https://exchange.1e.com/product-packs/network/", "creation_timestamp": "2025-05-20T08:39:57.000000Z"}, {"uuid": "a8a7a367-3bf2-4001-aa61-4b765e628c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45162", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16958", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45162\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Affected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution.\u00a0\n\nApplication of the relevant hotfix remediates this issue.\n\nfor v8.1.2 apply hotfix Q23166\nfor v8.4.1 apply hotfix Q23164\nfor v9.0.1 apply hotfix Q23169\n\nSaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this\n\ud83d\udccf Published: 2023-10-13T12:48:01.359Z\n\ud83d\udccf Modified: 2025-05-20T08:25:10.709Z\n\ud83d\udd17 References:\n1. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2004/", "creation_timestamp": "2025-05-20T08:39:56.000000Z"}, {"uuid": "b0024df0-7b0d-43bc-9059-a61c5f5b01a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45160", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16956", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45160\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. \n\nCustomers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability.\n\ud83d\udccf Published: 2023-10-05T15:12:20.743Z\n\ud83d\udccf Modified: 2025-05-20T08:27:16.763Z\n\ud83d\udd17 References:\n1. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2002/", "creation_timestamp": "2025-05-20T08:39:54.000000Z"}, {"uuid": "dd9e8d87-75ef-4e59-9e21-f1b19674a14e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45161", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16959", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45161\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI\n\ud83d\udccf Published: 2023-11-06T12:13:09.083Z\n\ud83d\udccf Modified: 2025-05-20T08:23:52.217Z\n\ud83d\udd17 References:\n1. https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2003/\n2. https://exchange.1e.com/product-packs/network/", "creation_timestamp": "2025-05-20T08:39:56.000000Z"}, {"uuid": "5f9d6528-b393-4b8a-939f-1bcbb3bada83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45161", "type": "seen", "source": "https://t.me/cibsecurity/73617", "content": "\u203c CVE-2023-45161 \u203c\n\nThe 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions.To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T16:25:52.000000Z"}, {"uuid": "66c2f0c0-25db-4270-b990-273a55de4894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45163", "type": "seen", "source": "https://t.me/cibsecurity/73615", "content": "\u203c CVE-2023-45163 \u203c\n\nThe 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions.To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T16:25:50.000000Z"}, {"uuid": "fe73750e-ab58-4a34-828b-892ab224fa41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45162", "type": "seen", "source": "https://t.me/cibsecurity/72232", "content": "\u203c CVE-2023-45162 \u203c\n\nAffected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution.\u00c2\u00a0Application of the relevant hotfix remediates this issue.for v8.1.2 apply hotfix Q23166for v8.4.1 apply hotfix Q23164for v9.0.1 apply hotfix Q23173SaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-13T16:28:58.000000Z"}, {"uuid": "bb4d4e3f-a4b8-46b4-bc6a-9e0c1787dbf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4516", "type": "seen", "source": "https://t.me/cibsecurity/70432", "content": "\u203c CVE-2023-4516 \u203c\n\nA CWE-306: Missing Authentication for Critical Function vulnerability exists in the IGSS UpdateService that could allow a local attacker to change update source, potentially leading to remotecode execution when the attacker force an update containing malicious content.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-14T12:24:21.000000Z"}, {"uuid": "8ec92d64-3f3f-4365-9e4b-45e66f358c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45169", "type": "seen", "source": "https://t.me/ctinow/166299", "content": "https://ift.tt/Q0diDAM\nCVE-2023-45169", "creation_timestamp": "2024-01-11T04:32:11.000000Z"}, {"uuid": "47d87481-3c66-4b45-9f84-835157378396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45169", "type": "seen", "source": "https://t.me/ctinow/173227", "content": "https://ift.tt/Mlwu6J5\nCVE-2023-45169 | IBM AIX/VIOS pmsvcs Kernel Extension denial of service (XFDB-267967)", "creation_timestamp": "2024-01-25T01:56:30.000000Z"}, {"uuid": "58e425cb-9f84-47fb-8bfb-45cac1e5c7d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45165", "type": "seen", "source": "https://t.me/ctinow/158487", "content": "https://ift.tt/Zwxkq0H\nCVE-2023-45165", "creation_timestamp": "2023-12-22T17:23:41.000000Z"}, {"uuid": "95442dcf-27ad-43df-aca9-2f5795055037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45165", "type": "seen", "source": "https://t.me/ctinow/169641", "content": "https://ift.tt/oh8ifSr\nCVE-2023-45165 | IBM AIX 7.2/7.3 SMB Client denial of service (XFDB-267963)", "creation_timestamp": "2024-01-18T10:11:28.000000Z"}, {"uuid": "bdfba92d-2399-469d-9e7d-0d244ab49da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45166", "type": "seen", "source": "https://t.me/ctinow/165844", "content": "https://ift.tt/q2OXcKn\nCVE-2023-45166 | IBM AIX/VIOS piodmgrsu Command access control (XFDB-267964)", "creation_timestamp": "2024-01-10T15:11:45.000000Z"}, {"uuid": "d527ddc6-9aaf-4479-8658-1a80cb850ec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45168", "type": "seen", "source": "https://t.me/ctinow/157915", "content": "https://ift.tt/IR4EfKO\nCVE-2023-45168 | IBM AIX/VIOS invscout Command memory corruption (XFDB-267966)", "creation_timestamp": "2023-12-21T19:41:31.000000Z"}]}