{"vulnerability": "CVE-2023-3724", "sightings": [{"uuid": "70e00747-fcc1-4acb-bd7d-e837b5006120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-37241", "type": "seen", "source": "https://t.me/cibsecurity/66067", "content": "\u203c CVE-2023-37241 \u203c\n\nInput verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T16:25:44.000000Z"}, {"uuid": "ae936479-cfef-46ff-82dc-ee343346de65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-37248", "type": "seen", "source": "https://t.me/cibsecurity/66354", "content": "\u203c CVE-2023-37248 \u203c\n\nA vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions &lt; V2201.0008), Tecnomatix Plant Simulation V2302 (All versions &lt; V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21155)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T14:29:45.000000Z"}, {"uuid": "15c8cee9-0ec4-4ec9-a898-2ac926b4a7da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-37249", "type": "seen", "source": "https://t.me/cibsecurity/69213", "content": "\u203c CVE-2023-37249 \u203c\n\nInfoblox NIOS through 8.5.1 has a faulty component that accepts malicious input without sanitization, resulting in shell access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-26T00:14:28.000000Z"}, {"uuid": "c2c9d348-8b96-4d31-8db0-43bfdbc8b380", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-37247", "type": "seen", "source": "https://t.me/cibsecurity/66342", "content": "\u203c CVE-2023-37247 \u203c\n\nA vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions &lt; V2201.0008), Tecnomatix Plant Simulation V2302 (All versions &lt; V2302.0002). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21138)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T14:29:28.000000Z"}]}