{"vulnerability": "CVE-2023-3245", "sightings": [{"uuid": "387a3b0d-6752-456c-be24-6ed1add0c6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32454", "type": "seen", "source": "https://t.me/ctinow/179848", "content": "https://ift.tt/HNEz4Me\nCVE-2023-32454", "creation_timestamp": "2024-02-06T09:26:13.000000Z"}, {"uuid": "4fa55df1-1250-4b36-acaf-75b99ef4115f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32458", "type": "seen", "source": "https://t.me/cibsecurity/71130", "content": "\u203c CVE-2023-32458 \u203c\n\nDell AppSync, versions 4.4.0.0 to 4.6.0.0 including Service Pack releases, contains an improper access control vulnerability in Embedded Service Enabler component. A local malicious user could potentially exploit this vulnerability during installation leading to a privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T20:35:53.000000Z"}, {"uuid": "a4c788b8-0d4f-4a26-b96a-043dd55eab7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32451", "type": "seen", "source": "https://t.me/ctinow/197309", "content": "https://ift.tt/AoPpKTi\nCVE-2023-32451 | Dell Display Manager 2.1.1.17 Uninstallation least privilege violation (dsa-2023-182)", "creation_timestamp": "2024-03-01T06:42:11.000000Z"}, {"uuid": "b59fb482-789b-4173-8f26-35c7f660a14c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32454", "type": "seen", "source": "https://t.me/ctinow/197403", "content": "https://ift.tt/1ifaCOL\nCVE-2023-32454 | Dell DUP Framework up to 4.9.4.36 on Windows Mount unknown vulnerability (dsa-2023-192)", "creation_timestamp": "2024-03-01T09:11:15.000000Z"}, {"uuid": "e052d2e5-c5b7-49f2-97cb-9df4d97c20d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32451", "type": "seen", "source": "https://t.me/ctinow/179847", "content": "https://ift.tt/09GIn5A\nCVE-2023-32451", "creation_timestamp": "2024-02-06T09:26:12.000000Z"}, {"uuid": "c49b612c-58ff-4023-9345-c2efeaae9f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32453", "type": "seen", "source": "https://t.me/cibsecurity/68691", "content": "\u203c CVE-2023-32453 \u203c\n\nDell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-17T00:36:44.000000Z"}]}