{"vulnerability": "CVE-2023-4015", "sightings": [{"uuid": "f90aef53-6c42-40a7-ac4b-8258661f1b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40159", "type": "seen", "source": "https://t.me/cvedetector/1170", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-40159 - Philips Vue PACS Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-40159 \nPublished : July 18, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A validated user not explicitly authorized to have access to certain sensitive information could access Philips Vue PACS on the same network to expose that information. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T20:08:30.000000Z"}, {"uuid": "e3a2dab8-d335-4756-bbcd-6c279f6faae0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40151", "type": "seen", "source": "https://thehackernews.com/2025/10/two-cvss-100-bugs-in-red-lion-rtus.html", "content": "", "creation_timestamp": "2025-10-15T04:50:00.000000Z"}, {"uuid": "242411d6-0915-4395-a4e8-e42d9be93140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40151", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m3bwka3urn26", "content": "", "creation_timestamp": "2025-10-16T04:34:03.962792Z"}, {"uuid": "91a88e97-6166-44d4-8a78-89ee95914cbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40156", "type": "seen", "source": "https://t.me/ctinow/201400", "content": "https://ift.tt/x1e2ACy\nCVE-2023-40156 | Intel SSU Software prior 3.0.0.2 uncontrolled search path (intel-sa-01011)", "creation_timestamp": "2024-03-06T14:41:29.000000Z"}, {"uuid": "83f8506b-95a8-4946-a476-9fa901806f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40153", "type": "seen", "source": "https://t.me/cibsecurity/72595", "content": "\u203c CVE-2023-40153 \u203c\n\nThe affected product is vulnerable to a cross-site scripting vulnerability, which could allow an attacker to access the web application to introduce arbitrary Java Script by injecting an XSS payload into the 'hostname' parameter of the vulnerable software.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-19T22:34:35.000000Z"}, {"uuid": "f77f4064-d2b5-4843-a2e8-904c7e6d79ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40154", "type": "seen", "source": "https://t.me/ctinow/201393", "content": "https://ift.tt/rznObsh\nCVE-2023-40154 | Intel SUR for Gameplay Software prior 2.0.1901 default permission (intel-sa-01004)", "creation_timestamp": "2024-03-06T14:41:21.000000Z"}, {"uuid": "8903f68a-a579-4321-9c81-a0e14bc56dba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40156", "type": "seen", "source": "https://t.me/ctinow/184819", "content": "https://ift.tt/ly5mQjr\nCVE-2023-40156", "creation_timestamp": "2024-02-14T17:03:14.000000Z"}, {"uuid": "5a0da9cb-c37d-466c-887c-691a29f6e9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40154", "type": "seen", "source": "https://t.me/ctinow/184818", "content": "https://ift.tt/NKT3ew8\nCVE-2023-40154", "creation_timestamp": "2024-02-14T17:03:13.000000Z"}, {"uuid": "3e48555d-1215-49e8-9e61-41b11ed705f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40150", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/4535", "content": "https://www.youtube.com/watch?v=WkLuipNbuXQ\n\nHealthcare Data Breach Report \u2014 \u0441\u043d\u0438\u043c\u043a\u0438, \u0430\u043d\u0430\u043b\u0438\u0437\u044b \u0438 \u0434\u0438\u0430\u0433\u043d\u043e\u0437\u044b \u043f\u0430\u0446\u0438\u0435\u043d\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0442\u0435\u043a\u0430\u043b\u0438 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0434\u0432\u0430 \u0433\u043e\u0434\u0430. \u041d\u0430 \u043f\u0435\u0440\u0432\u043e\u043c \u043c\u0435\u0441\u0442\u0435 \u0443\u0442\u0435\u0447\u043a\u0430, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u043f\u043e\u0447\u0442\u0438 12 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0447\u0435\u043b\u043e\u0432\u0435\u043a \u2014 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u0432\u0437\u043b\u043e\u043c\u0430 PACS-\u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0447\u0430\u0441\u0442\u044c\u044e \"\u0432\u0440\u0430\u0447\u0435\u0431\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430\" DICOM.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0431\u0437\u043e\u0440 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 DICOM Demystified: Exploring the Underbelly of Medical Imaging, \u043f\u0440\u0438\u043c\u0435\u0440 \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2023-40150 \u0432 Softneta MedDream \u0438 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0435 \u0432\u0438\u0434\u0435\u043e, \u043a\u0430\u043a \u0435\u0433\u043e \u043b\u043e\u043c\u0430\u0442\u044c.", "creation_timestamp": "2024-02-20T20:05:39.000000Z"}]}