{"uuid": "93dae0f8-ebeb-4e28-a324-942c5cddb54d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0221", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10477", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-0221\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Product security bypass vulnerability in ACC prior to version 8.3.4 allows a locally logged-in attacker with administrator privileges to bypass the execution controls provided by ACC using the utilman program.\n\n\ud83d\udccf Published: 2023-01-13T15:19:03.662Z\n\ud83d\udccf Modified: 2025-04-04T14:49:27.402Z\n\ud83d\udd17 References:\n1. https://kcm.trellix.com/corporate/index?page=content&amp;id=SB10370", "creation_timestamp": "2025-04-04T15:37:03.000000Z"}