{"vulnerability": "CVE-2023-3649", "sightings": [{"uuid": "a36acde4-bbec-4129-bb71-94be8193a37b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36493", "type": "seen", "source": "https://t.me/ctinow/201392", "content": "https://ift.tt/0DwyTHu\nCVE-2023-36493 | Intel SDK for OpenCL Applications Software uncontrolled search path (intel-sa-00992)", "creation_timestamp": "2024-03-06T14:41:20.000000Z"}, {"uuid": "a4b5c5ad-4ea7-4236-8583-eedb4f6b641e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36498", "type": "seen", "source": "https://t.me/ctinow/197526", "content": "https://ift.tt/Dd5gkwB\nCVE-2023-36498 | TP-LINK ER7206 Omada Gigabit VPN Router 1.3.0 Build 20230322 Rel.70591 PPTP Client os command injection (TALOS-2023-1853)", "creation_timestamp": "2024-03-01T11:41:34.000000Z"}, {"uuid": "fc04ef65-ef00-4b60-aff8-f2f25b829f49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36490", "type": "seen", "source": "https://t.me/ctinow/201365", "content": "https://ift.tt/1QCPgFp\nCVE-2023-36490 | Intel MAS Software prior 2.3 denial of service (intel-sa-00967)", "creation_timestamp": "2024-03-06T14:11:54.000000Z"}, {"uuid": "92ebaaff-2dbe-45bb-a221-85b40e0b9b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36496", "type": "seen", "source": "https://t.me/ctinow/192616", "content": "https://ift.tt/LWS8dbH\nCVE-2023-36496 | Ping Identity PingDirectory up to 8.3.0.8/9.0.0.5/9.1.0.2/9.2.0.1/9.3.0.0 privileges management", "creation_timestamp": "2024-02-24T15:16:44.000000Z"}, {"uuid": "3e5127b6-bc35-444a-b15c-eb54845ac115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36490", "type": "seen", "source": "https://t.me/ctinow/184809", "content": "https://ift.tt/tD3zqwG\nCVE-2023-36490", "creation_timestamp": "2024-02-14T17:03:02.000000Z"}, {"uuid": "da1acec3-1b72-4526-a696-8f0d67ad1093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36496", "type": "seen", "source": "https://t.me/ctinow/177835", "content": "https://ift.tt/wpL5qVP\nCVE-2023-36496", "creation_timestamp": "2024-02-02T00:26:21.000000Z"}, {"uuid": "5a770e54-ce4b-4e4f-a277-f0dfb6d75936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36498", "type": "seen", "source": "https://t.me/ctinow/180200", "content": "https://ift.tt/j8vpxJR\nCVE-2023-36498", "creation_timestamp": "2024-02-06T18:26:51.000000Z"}, {"uuid": "dbe98b42-9f26-426d-aebb-dd2dd3708cf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36493", "type": "seen", "source": "https://t.me/ctinow/184810", "content": "https://ift.tt/eJGTL3c\nCVE-2023-36493", "creation_timestamp": "2024-02-14T17:03:03.000000Z"}, {"uuid": "ba6e13e1-f6c5-4c79-b726-42b6a1d30ec2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36499", "type": "seen", "source": "https://t.me/cibsecurity/67911", "content": "\u203c CVE-2023-36499 \u203c\n\nNetgear XR300 v1.0.3.78 was discovered to contain multiple buffer overflows via the wla_ssid and wlg_ssid parameters at genie_ap_wifi_change.cgi.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T22:18:45.000000Z"}, {"uuid": "d0df8293-680b-4e04-8ed9-73d25da5e806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36492", "type": "seen", "source": "https://t.me/cibsecurity/69847", "content": "\u203c CVE-2023-36492 \u203c\n\nReflected cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T14:16:54.000000Z"}, {"uuid": "5d857906-1627-4fa0-ac4e-18c839112ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36495", "type": "seen", "source": "https://t.me/cibsecurity/67369", "content": "\u203c CVE-2023-36495 \u203c\n\nAn integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-28T12:29:30.000000Z"}, {"uuid": "2eae61b7-0b32-4866-bbf9-c577017c0e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36494", "type": "seen", "source": "https://t.me/cibsecurity/67604", "content": "\u203c CVE-2023-36494 \u203c\n\nAudit logs on F5OS-A may contain undisclosed sensitive information.\u00c2\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T20:39:24.000000Z"}]}