{"vulnerability": "CVE-2023-4053", "sightings": [{"uuid": "6ee990fc-7862-4647-ba03-18f2343ce8d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40539", "type": "seen", "source": "https://t.me/cvedetector/1168", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-40539 - Philips Vue PACS Weak Password Policy Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-40539 \nPublished : July 18, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Philips Vue PACS does not require that users have strong passwords, which could make it easier for attackers to compromise user accounts. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T20:08:25.000000Z"}, {"uuid": "5e554333-1813-4875-ac60-1863dad44c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40534", "type": "seen", "source": "https://t.me/cibsecurity/71924", "content": "\u203c CVE-2023-40534 \u203c\n\nWhen a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate.\u00c2\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T22:46:13.000000Z"}, {"uuid": "c7f87f3e-82ff-479a-9e96-6de26a5ce34d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40531", "type": "seen", "source": "https://t.me/cibsecurity/69986", "content": "\u203c CVE-2023-40531 \u203c\n\nArcher AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T14:17:50.000000Z"}, {"uuid": "a422430b-0cb1-47da-a8e2-cac3e95451c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40537", "type": "seen", "source": "https://t.me/cibsecurity/71936", "content": "\u203c CVE-2023-40537 \u203c\n\nAn authenticated user's session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform.\u00c2\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T16:16:59.000000Z"}, {"uuid": "cf19add8-51f4-4599-80d6-8f2ace903a9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40535", "type": "seen", "source": "https://t.me/cibsecurity/69835", "content": "\u203c CVE-2023-40535 \u203c\n\nStored cross-site scripting vulnerability in View setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T12:17:10.000000Z"}, {"uuid": "e63f34b1-c06e-4279-9218-ca39f46c4be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4053", "type": "seen", "source": "https://t.me/cibsecurity/67518", "content": "\u203c CVE-2023-4053 \u203c\n\nA website could have obscured the full screen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 116.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-01T18:38:52.000000Z"}]}