{"vulnerability": "CVE-2023-3312", "sightings": [{"uuid": "3877fe39-4894-4a12-ae93-f023c6a9f2e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33124", "type": "seen", "source": "https://t.me/cibsecurity/65152", "content": "\u203c CVE-2023-33124 \u203c\n\nA vulnerability has been identified in JT2Go (All versions &lt; V14.2.0.3), Teamcenter Visualization V13.2 (All versions &lt; V13.2.0.13), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.10), Teamcenter Visualization V14.0 (All versions &lt; V14.0.0.6), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.8), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.3). The affected applications contain a memory corruption vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-13T12:14:50.000000Z"}, {"uuid": "2baa90d8-82aa-4a42-85f6-22107290b97f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33120", "type": "seen", "source": "https://t.me/cibsecurity/74166", "content": "\u203c\ufe0fCVE-2023-33120\u203c\ufe0f\n\nMemory corruption in Audio when memory map command is executed consecutively in ADSP.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:34:25.000000Z"}, {"uuid": "ed6e8c05-cf43-4e73-99e9-ce27844095c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33127", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9479", "content": "#Offensive_security\n1. nysm - A stealth post-exploitation container\nhttps://securityonline.info/nysm-a-stealth-post-exploitation-container\n2. Abusing .NET Core CLR Diagnostic Features (+CVE-2023-33127)\nhttps://bohops.com/2023/11/27/abusing-net-core-clr-diagnostic-features-cve-2023-33127", "creation_timestamp": "2023-11-28T10:58:01.000000Z"}, {"uuid": "5b2d9571-918d-4099-88db-2cd22322ce64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33126", "type": "seen", "source": "https://t.me/cibsecurity/65216", "content": "\u203c CVE-2023-33126 \u203c\n\n.NET and Visual Studio Remote Code Execution Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-14T07:34:18.000000Z"}, {"uuid": "219ebdec-9650-4f98-af65-853ddbda7052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33127", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1608", "content": "https://bohops.com/2023/11/27/abusing-net-core-clr-diagnostic-features-cve-2023-33127/\nCVE-2023-33127\n#\u5206\u6790", "creation_timestamp": "2023-11-29T09:32:36.000000Z"}, {"uuid": "eb1caec7-bca6-4689-b810-2878cf82c438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33127", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2128", "content": "#Offensive_security\n1. nysm - A stealth post-exploitation container\nhttps://securityonline.info/nysm-a-stealth-post-exploitation-container\n2. Abusing .NET Core CLR Diagnostic Features (+CVE-2023-33127)\nhttps://bohops.com/2023/11/27/abusing-net-core-clr-diagnostic-features-cve-2023-33127", "creation_timestamp": "2024-08-16T08:53:00.000000Z"}]}