{"vulnerability": "CVE-2023-2914", "sightings": [{"uuid": "fc54b859-7d6e-424f-8cc1-7eb809d48b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2914", "type": "seen", "source": "https://t.me/cibsecurity/68767", "content": "\u203c CVE-2023-2914 \u203c\n\nThe Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-17T20:37:30.000000Z"}, {"uuid": "7d967a6e-fab9-4a4a-9885-22e8540f341a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29144", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7subs7qwn22", "content": "", "creation_timestamp": "2025-12-12T19:49:35.110115Z"}, {"uuid": "3ac26066-96c0-4964-9587-2c2789cc537e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29140", "type": "seen", "source": "https://t.me/cibsecurity/61270", "content": "\u203c CVE-2023-29140 \u203c\n\nAn issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. Attackers might be able to see edits for which the username has been hidden, because there is no check for rev_deleted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-31T22:22:21.000000Z"}, {"uuid": "8b18c5bf-240c-4cf4-b416-caba38946bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29145", "type": "seen", "source": "https://t.me/cibsecurity/65828", "content": "\u203c CVE-2023-29145 \u203c\n\nThe Malwarebytes EDR 1.0.11 for Linux driver doesn't properly ensure whitelisting of executable libraries loaded by executable files, allowing arbitrary code execution. The attacker can set LD_LIBRARY_PATH, set LD_PRELOAD, or run an executable file in a debugger.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-01T00:15:23.000000Z"}, {"uuid": "9975a6ea-f0c2-4b96-8f28-9d14282663be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29147", "type": "seen", "source": "https://t.me/cibsecurity/65829", "content": "\u203c CVE-2023-29147 \u203c\n\nIn Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-01T00:15:24.000000Z"}, {"uuid": "89d3aac8-87f0-401a-b6b1-3afc7a3c7228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29141", "type": "seen", "source": "https://t.me/cibsecurity/61276", "content": "\u203c CVE-2023-29141 \u203c\n\nAn issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-31T22:22:27.000000Z"}]}