{"vulnerability": "CVE-2023-5174", "sightings": [{"uuid": "bcbeb62d-b35e-475c-81df-d45302a671af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51747", "type": "seen", "source": "https://t.me/ctinow/194502", "content": "https://ift.tt/enqpCu1\nCVE-2023-51747", "creation_timestamp": "2024-02-27T15:36:27.000000Z"}, {"uuid": "48dadb0e-a56a-4550-857c-c60900a3b28b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51748", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18992", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51748\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ScaleFusion 10.5.2 does not properly limit users to the Edge application because Ctrl-O and Ctrl-S can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.\n\ud83d\udccf Published: 2024-01-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T16:18:22.591Z\n\ud83d\udd17 References:\n1. https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59\n2. https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6\n3. https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent", "creation_timestamp": "2025-06-20T16:44:47.000000Z"}, {"uuid": "66233b66-0e21-4199-b15e-5dc902eeec93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51744\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: A vulnerability has been identified in JT2Go (All versions &lt; V14.3.0.6), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.13), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.12), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.9), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.\n\ud83d\udccf Published: 2024-01-09T10:00:15.708Z\n\ud83d\udccf Modified: 2025-06-09T20:32:57.525Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf", "creation_timestamp": "2025-06-09T21:32:21.000000Z"}, {"uuid": "8f6953e1-29c8-469e-bbce-8e7e37ad5312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51747", "type": "seen", "source": "https://t.me/ctinow/194491", "content": "https://ift.tt/enqpCu1\nCVE-2023-51747", "creation_timestamp": "2024-02-27T15:31:44.000000Z"}, {"uuid": "e55e41e5-d137-4454-85b9-831b386a7aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51742", "type": "seen", "source": "https://t.me/ctinow/182555", "content": "https://ift.tt/YqyUW0i\nCVE-2023-51742 | Hathway Skyworth Router CM5100 up to 4.1.1.24 Web Interface Add Downstream Frequency out-of-bounds write (CIVN-2024-0013)", "creation_timestamp": "2024-02-10T14:46:07.000000Z"}, {"uuid": "04ba2630-fbbf-4589-9558-c0eb26eb88fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51743", "type": "seen", "source": "https://t.me/ctinow/182554", "content": "https://ift.tt/6HNmqiw\nCVE-2023-51743 | Hathway Skyworth Router CM5100 up to 4.1.1.24 Web Interface Set Upstream Channel ID out-of-bounds write (CIVN-2024-0013)", "creation_timestamp": "2024-02-10T14:46:06.000000Z"}, {"uuid": "ac5e4ea4-450a-4309-a536-4e37ffae000f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51749", "type": "seen", "source": "https://t.me/ctinow/175965", "content": "https://ift.tt/Djv79Ga\nCVE-2023-51749 | ScaleFusion 10.5.2 Tooltip access control", "creation_timestamp": "2024-01-30T15:22:15.000000Z"}, {"uuid": "e5297cbb-2e57-4806-8c66-f8b31e71a9de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51744", "type": "seen", "source": "https://t.me/ctinow/174064", "content": "https://ift.tt/xtESL9D\nCVE-2023-51744 | Siemens JT2Go/Teamcenter Visualization CGM File null pointer dereference (ssa-794653)", "creation_timestamp": "2024-01-26T09:06:24.000000Z"}, {"uuid": "4b16fd49-2489-4ece-8818-0fabd1de252b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51740", "type": "seen", "source": "https://t.me/ctinow/169167", "content": "https://ift.tt/OEXNhdB\nCVE-2023-51740", "creation_timestamp": "2024-01-17T09:27:05.000000Z"}, {"uuid": "57e5850c-b78b-4fbd-b7c5-3620eadec218", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51743", "type": "seen", "source": "https://t.me/ctinow/169170", "content": "https://ift.tt/IFuGL1V\nCVE-2023-51743", "creation_timestamp": "2024-01-17T09:27:08.000000Z"}, {"uuid": "6e8d9e68-8742-485d-acb6-9b9cef6e38ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51742", "type": "seen", "source": "https://t.me/ctinow/169169", "content": "https://ift.tt/ZTB52OY\nCVE-2023-51742", "creation_timestamp": "2024-01-17T09:27:07.000000Z"}, {"uuid": "c615b12a-102d-41f1-adef-fcd3a0951554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51741", "type": "seen", "source": "https://t.me/ctinow/169168", "content": "https://ift.tt/zhO6xoU\nCVE-2023-51741", "creation_timestamp": "2024-01-17T09:27:06.000000Z"}, {"uuid": "226a8be0-40a0-41a1-b6c4-eb54bf841a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51749", "type": "seen", "source": "https://t.me/ctinow/169937", "content": "https://ift.tt/AhjMfVv\nCVE-2023-51749 Exploit", "creation_timestamp": "2024-01-18T21:16:50.000000Z"}, {"uuid": "840113a4-65ac-42ea-b57c-fc9cc2759ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51748", "type": "seen", "source": "https://t.me/ctinow/169936", "content": "https://ift.tt/1T9rpns\nCVE-2023-51748 Exploit", "creation_timestamp": "2024-01-18T21:16:49.000000Z"}, {"uuid": "b72cbb38-0d18-42e5-93e7-04c08cc75666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51749", "type": "seen", "source": "https://t.me/ctinow/166573", "content": "https://ift.tt/btAsEHN\nCVE-2023-51749", "creation_timestamp": "2024-01-11T15:52:06.000000Z"}, {"uuid": "d621f15a-be71-4cc4-8267-37300d640bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51748", "type": "seen", "source": "https://t.me/ctinow/166572", "content": "https://ift.tt/qhfBFoC\nCVE-2023-51748", "creation_timestamp": "2024-01-11T15:52:05.000000Z"}, {"uuid": "a3f4b1a8-7849-4368-817b-ba8df67a4bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51744", "type": "seen", "source": "https://t.me/ctinow/164950", "content": "https://ift.tt/LnhWbiI\nCVE-2023-51744", "creation_timestamp": "2024-01-09T11:26:31.000000Z"}]}