{"vulnerability": "CVE-2023-2450", "sightings": [{"uuid": "89b9eaea-8a10-4da7-9c1e-4024f27de050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24504", "type": "seen", "source": "https://t.me/cibsecurity/62324", "content": "\u203c CVE-2023-24504 \u203c\n\nElectra Central AC unit \u00e2\u20ac\u201c Adjacent attacker may cause the unit to connect to unauthorized update server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T02:28:55.000000Z"}, {"uuid": "9410ef29-3eb3-441f-9086-5a4c2368a3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24501", "type": "seen", "source": "https://t.me/cibsecurity/62322", "content": "\u203c CVE-2023-24501 \u203c\n\nElectra Central AC unit \u00e2\u20ac\u201c Hardcoded Credentials in unspecified code used by the unit.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T02:28:50.000000Z"}, {"uuid": "1e8f59c4-ef71-47df-9735-cf1fbedfe2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24502", "type": "seen", "source": "https://t.me/cibsecurity/62317", "content": "\u203c CVE-2023-24502 \u203c\n\nElectra Central AC unit \u00e2\u20ac\u201c The unit opens an AP with an easily calculated password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T02:28:42.000000Z"}, {"uuid": "29973a32-d0f0-4b8e-8e63-aea6dfc2b99d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24509", "type": "seen", "source": "https://t.me/cibsecurity/62095", "content": "\u203c CVE-2023-24509 \u203c\n\nOn affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-14T00:25:30.000000Z"}, {"uuid": "a3aabf4a-1dba-4b79-b679-2161b1afe703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24500", "type": "seen", "source": "https://t.me/cibsecurity/62333", "content": "\u203c CVE-2023-24500 \u203c\n\nElectra Central AC unit \u00e2\u20ac\u201c Adjacent attacker may cause the unit to load unauthorized FW.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T02:29:07.000000Z"}, {"uuid": "a5aff364-f37e-4f8b-b726-0dae5d7d37f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24506", "type": "seen", "source": "https://t.me/cibsecurity/63519", "content": "\u203c CVE-2023-24506 \u203c\n\nMilesight NCR/camera version 71.8.0.6-r5 exposes credentials through an unspecified request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:51:07.000000Z"}, {"uuid": "239773da-aa1d-4abb-93fb-673b5ef92292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24505", "type": "seen", "source": "https://t.me/cibsecurity/63499", "content": "\u203c CVE-2023-24505 \u203c\n\nMilesight NCR/camera version 71.8.0.6-r5 discloses sensitive information through an unspecified request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:43:14.000000Z"}]}