{"vulnerability": "CVE-2023-3227", "sightings": [{"uuid": "4279eb58-d86b-4260-aa60-0085364823df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32272", "type": "seen", "source": "https://t.me/ctinow/185684", "content": "https://ift.tt/vZFBRgi\nCVE-2023-32272 | Intel NUC Pro Software Suite Configuration Tool prior 3.0.0.6 uncontrolled search path (intel-sa-00964)", "creation_timestamp": "2024-02-15T16:52:00.000000Z"}, {"uuid": "e4c29979-4e0a-452a-9f49-54fdf4b6e3c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32277", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993035661676689", "content": "", "creation_timestamp": "2025-02-12T21:28:06.333732Z"}, {"uuid": "173e3927-dd94-4a59-8233-63e65ecd13d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32277", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz76uejkp2i", "content": "", "creation_timestamp": "2025-02-12T22:16:06.605447Z"}, {"uuid": "80016c1a-b0ae-4b50-b01f-4120764af1da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32275", "type": "seen", "source": "https://t.me/cibsecurity/72182", "content": "\u203c CVE-2023-32275 \u203c\n\nAn information disclosure vulnerability exists in the CtEnumCa() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. Specially crafted network packets can lead to a disclosure of sensitive information. An attacker can send packets to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-12T20:23:20.000000Z"}, {"uuid": "1f037d69-bdb9-4417-aca1-8bb727009b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32272", "type": "seen", "source": "https://t.me/ctinow/170409", "content": "https://ift.tt/8VKlAfC\nCVE-2023-32272", "creation_timestamp": "2024-01-19T21:27:18.000000Z"}, {"uuid": "c7ac5620-599f-40d3-95b2-9318b3974b54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32271", "type": "seen", "source": "https://t.me/cibsecurity/69864", "content": "\u203c CVE-2023-32271 \u203c\n\nAn information disclosure vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to a disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T20:17:12.000000Z"}]}