{"vulnerability": "CVE-2023-4826", "sightings": [{"uuid": "4ad41397-b14d-4811-8479-2cdfac41cbee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993094686929174", "content": "", "creation_timestamp": "2025-02-12T21:43:06.935104Z"}, {"uuid": "a449a3c1-b56e-4b5c-bb28-2632326367e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz774ush72i", "content": "", "creation_timestamp": "2025-02-12T22:16:15.622922Z"}, {"uuid": "a9118e30-800f-4150-adb0-ac1956d453bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191651", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:23.000000Z"}, {"uuid": "bbbeefd0-479f-4eba-be2c-3b82643a1d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48267\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-12T21:20:14.271Z\n\ud83d\udccf Modified: 2025-02-19T04:55:14.788Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", "creation_timestamp": "2025-02-19T08:39:13.000000Z"}, {"uuid": "29231546-549b-41da-a161-f741a2c799c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48268", "type": "seen", "source": "https://t.me/ctinow/155468", "content": "https://ift.tt/ZgL70PW\nCVE-2023-48268 | Mattermost up to 7.8.12/8.1.3/9.0.1/9.1.0 Zip resource consumption", "creation_timestamp": "2023-12-16T20:22:56.000000Z"}, {"uuid": "6a236e38-fe2f-4502-ab25-83353f7d3f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48264", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48264\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.\n\ud83d\udccf Published: 2024-01-10T13:09:10.347Z\n\ud83d\udccf Modified: 2025-04-17T15:48:37.330Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html", "creation_timestamp": "2025-04-17T15:57:53.000000Z"}, {"uuid": "1530041f-310e-448f-99a7-73627e62874f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191654", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:26.000000Z"}, {"uuid": "8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48266", "type": "seen", "source": "https://t.me/ctinow/174905", "content": "https://ift.tt/2j5nAm8\nCVE-2023-48266 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:44.000000Z"}, {"uuid": "feaa14a4-10b7-41b1-9abd-e8285c745c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48261", "type": "seen", "source": "https://t.me/ctinow/174926", "content": "https://ift.tt/k52VF4A\nCVE-2023-48261 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:28.000000Z"}, {"uuid": "91a8999c-3824-415f-b6cc-b5319d9ced22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48260", "type": "seen", "source": "https://t.me/ctinow/174925", "content": "https://ift.tt/CXOrc2h\nCVE-2023-48260 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:27.000000Z"}, {"uuid": "ad6904d6-ac3e-4b3a-8717-509e241f18ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48265", "type": "seen", "source": "https://t.me/ctinow/174904", "content": "https://ift.tt/C2EXdpv\nCVE-2023-48265 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:43.000000Z"}, {"uuid": "93a9578f-d64b-48f6-9801-b4cacc1cb07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48264", "type": "seen", "source": "https://t.me/ctinow/174903", "content": "https://ift.tt/PRmaL69\nCVE-2023-48264 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:42.000000Z"}, {"uuid": "6761e198-f573-45c7-a5be-5c697e09f6e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48263", "type": "seen", "source": "https://t.me/ctinow/174902", "content": "https://ift.tt/RTeiG7c\nCVE-2023-48263 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request heap-based overflow", "creation_timestamp": "2024-01-28T11:26:41.000000Z"}, {"uuid": "3b233679-8d80-4a84-a2fc-024002fc458d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48262", "type": "seen", "source": "https://t.me/ctinow/174899", "content": "https://ift.tt/hac5xDY\nCVE-2023-48262 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T10:56:19.000000Z"}, {"uuid": "d96bced4-ebf7-4934-b0ac-72a922353e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48261", "type": "seen", "source": "https://t.me/ctinow/165815", "content": "https://ift.tt/onEgWK2\nCVE-2023-48261", "creation_timestamp": "2024-01-10T14:31:44.000000Z"}, {"uuid": "4b1dbbe6-9b1e-4be1-9c3b-d3fb3d41aecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48264", "type": "seen", "source": "https://t.me/ctinow/165818", "content": "https://ift.tt/eUgGdqi\nCVE-2023-48264", "creation_timestamp": "2024-01-10T14:31:47.000000Z"}, {"uuid": "5633a2fc-e95f-4033-a44d-1568afec2396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48263", "type": "seen", "source": "https://t.me/ctinow/165817", "content": "https://ift.tt/fsWYqGv\nCVE-2023-48263", "creation_timestamp": "2024-01-10T14:31:46.000000Z"}, {"uuid": "b09c8a85-dba2-4af1-a321-31ab9efeb3c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48262", "type": "seen", "source": "https://t.me/ctinow/165816", "content": "https://ift.tt/CIsigEb\nCVE-2023-48262", "creation_timestamp": "2024-01-10T14:31:45.000000Z"}, {"uuid": "04b75c56-233d-4e85-baaa-7eff9c505740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48260", "type": "seen", "source": "https://t.me/ctinow/165814", "content": "https://ift.tt/D9MYF8K\nCVE-2023-48260", "creation_timestamp": "2024-01-10T14:31:43.000000Z"}, {"uuid": "7666ef61-668b-46b4-a2ac-82640b4a0c35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48266", "type": "seen", "source": "https://t.me/ctinow/165820", "content": "https://ift.tt/IcJm5TW\nCVE-2023-48266", "creation_timestamp": "2024-01-10T14:31:49.000000Z"}, {"uuid": "4f737f81-fd42-4877-8770-315310ac627a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48265", "type": "seen", "source": "https://t.me/ctinow/165819", "content": "https://ift.tt/dXKztDv\nCVE-2023-48265", "creation_timestamp": "2024-01-10T14:31:48.000000Z"}]}