{"vulnerability": "CVE-2023-1544", "sightings": [{"uuid": "ce055278-0071-4dc3-9a28-5a235e2285e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1544", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mbtivjpfks2m", "content": "", "creation_timestamp": "2026-01-07T12:48:58.879870Z"}, {"uuid": "3bff673e-ef43-4e27-b1f7-37d3b183616f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1544", "type": "seen", "source": "https://t.me/cibsecurity/60627", "content": "\u203c CVE-2023-1544 \u203c\n\nA flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-23T23:37:10.000000Z"}]}