{"vulnerability": "CVE-2023-38139", "sightings": [{"uuid": "a851ac05-dd19-4417-9a02-98387f8c56b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html", "content": "", "creation_timestamp": "2024-04-18T16:45:00.000000Z"}, {"uuid": "39a45f6a-1569-4ab7-8278-7b87eb9898db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/12/the-windows-registry-adventure-5-regf.html", "content": "", "creation_timestamp": "2024-12-19T18:03:00.000000Z"}, {"uuid": "805ddb71-3b75-4d92-ae0f-ca718c108288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-8-exploitation.html", "content": "", "creation_timestamp": "2025-05-28T05:00:00.000000Z"}, {"uuid": "a1d8ce76-f05e-4903-bf9e-43052aac8dae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T07:05:54.874000Z"}, {"uuid": "579778e4-b105-4fcb-96b7-7061ba99257c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-8-exploitation.html", "content": "", "creation_timestamp": "2025-05-28T16:09:15.861000Z"}, {"uuid": "b316d143-93b5-4875-87fe-a3cf5cfb30cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T05:00:00.000000Z"}, {"uuid": "5654cd72-d3c1-41a4-8951-98811cf0b56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "seen", "source": "https://t.me/cibsecurity/70325", "content": "\u203c CVE-2023-38139 \u203c\n\nWindows Kernel Elevation of Privilege Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:29:16.000000Z"}, {"uuid": "f74ff197-89ec-4f37-bf1a-16727a995158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9121", "content": "#exploit\n1. CVE-2023-5074:\nD-Link D-View Authentication Bypass\nhttps://github.com/codeb0ss/CVE-2023-5074-PoC\n\n2. CVE-2023-38139:\nWindows Kernel Refcount Overflow/UaF\nhttps://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html", "creation_timestamp": "2023-10-01T12:50:40.000000Z"}, {"uuid": "813751ce-83d1-4f24-90d6-3aaa9ac35afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38139", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1218", "content": "#exploit\n1. CVE-2023-5074:\nD-Link D-View Authentication Bypass\nhttps://github.com/codeb0ss/CVE-2023-5074-PoC\n\n2. CVE-2023-38139:\nWindows Kernel Refcount Overflow/UaF\nhttps://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html", "creation_timestamp": "2024-08-16T08:30:30.000000Z"}]}