{"vulnerability": "CVE-2023-2454", "sightings": [{"uuid": "9a402fe2-127c-4532-b08f-da3cdcfe81d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24542", "type": "seen", "source": "https://t.me/ctinow/201153", "content": "https://ift.tt/5sPWmCT\nCVE-2023-24542 | Intel Thunderbolt DCH Drivers on Windows unquoted search path (intel-sa-00851)", "creation_timestamp": "2024-03-06T09:37:07.000000Z"}, {"uuid": "8a986580-e2da-453f-b958-903a67274a51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24548", "type": "seen", "source": "https://t.me/cibsecurity/69364", "content": "\u203c CVE-2023-24548 \u203c\n\nOn affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-29T20:17:40.000000Z"}, {"uuid": "cdbc01a9-b092-49c9-a83d-cc00cf9e9027", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24545", "type": "seen", "source": "https://t.me/cibsecurity/62022", "content": "\u203c CVE-2023-24545 \u203c\n\nOn affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-13T00:24:35.000000Z"}, {"uuid": "3db16d26-37f5-464c-bd40-b277871d8718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24540", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2944", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24540\n\ud83d\udd39 Description: Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.\n\ud83d\udccf Published: 2023-05-11T15:29:31.947Z\n\ud83d\udccf Modified: 2025-01-24T16:45:07.999Z\n\ud83d\udd17 References:\n1. https://go.dev/issue/59721\n2. https://go.dev/cl/491616\n3. https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU\n4. https://pkg.go.dev/vuln/GO-2023-1752", "creation_timestamp": "2025-01-24T17:04:57.000000Z"}, {"uuid": "29b5b6bd-9d3f-411e-adfb-e4e9b03986f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24547", "type": "seen", "source": "https://t.me/ctinow/159064", "content": "https://ift.tt/3WZ4Uid\nCVE-2023-24547 | Arista MOS up to 0.39.4 BGP Password log file", "creation_timestamp": "2023-12-24T17:51:09.000000Z"}, {"uuid": "ce002e71-04b0-4025-8aec-ee0aa9802c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24540", "type": "seen", "source": "https://t.me/cibsecurity/63902", "content": "\u203c CVE-2023-24540 \u203c\n\nNot all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-11T20:15:29.000000Z"}]}