{"vulnerability": "CVE-2023-4125", "sightings": [{"uuid": "7426bcc6-a81c-4063-a493-7743bf55e76d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41252", "type": "seen", "source": "https://t.me/ctinow/201415", "content": "https://ift.tt/xLQlSZ8\nCVE-2023-41252 | Intel QAT Software Drivers prior QAT1.7-W-1.11.0 on Windows denial of service (intel-sa-01000)", "creation_timestamp": "2024-03-06T15:16:44.000000Z"}, {"uuid": "e2b6f2a5-54ae-46a1-9e8e-be5c8712f50e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41253", "type": "seen", "source": "https://t.me/cibsecurity/71926", "content": "\u203c CVE-2023-41253 \u203c\n\nWhen on BIG-IP DNS or BIG-IP LTM enabled with DNS Services License, and a TSIG key is created, it is logged in plaintext in the audit log.\u00c2\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T16:16:49.000000Z"}, {"uuid": "cdaeca61-6394-4b49-9aee-aa9f26e4bbb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41256", "type": "seen", "source": "https://t.me/cibsecurity/70218", "content": "\u203c CVE-2023-41256 \u203c\n\nDover Fueling Solutions MAGLINK LX Web Console Configuration versions 2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, and 3.3 are vulnerable to authentication bypass that could allow an unauthorized attacker to obtain user access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T22:27:41.000000Z"}]}