{"vulnerability": "CVE-2023-3917", "sightings": [{"uuid": "0ee31b8e-b46d-4ac3-a30c-91d7ae956e34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39176", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "4521021a-b8c4-42dc-a077-ed365cf8e484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39178", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4dktewuu626", "content": "", "creation_timestamp": "2025-10-29T13:34:56.236748Z"}, {"uuid": "9b5d404e-6caa-4a5a-8202-36c3098a5507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39177", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4dkzdywck2b", "content": "", "creation_timestamp": "2025-10-29T13:38:16.568086Z"}, {"uuid": "c1f0d9ea-0c1f-4526-a507-ce57278fdc90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39178", "type": "seen", "source": "https://gist.github.com/Darkcrai86/8dd2eff50385c464d1bad60de714248f", "content": "", "creation_timestamp": "2025-10-29T14:55:36.000000Z"}, {"uuid": "13c9663e-056c-4ad9-b3f2-eb5e88b1edd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39176", "type": "seen", "source": "https://t.me/cvedetector/11323", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-39176 - Linux ksmbd SMB2 Transform Header Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-39176 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:16.000000Z"}, {"uuid": "5370d6a5-c32c-4cf8-9e72-0cc9c07f8b34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39179", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}, {"uuid": "39babb1c-8b8c-453a-b72c-69d7f8cbebae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39179", "type": "seen", "source": "https://t.me/cvedetector/11324", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-39179 - Linux ksmbd SMB2 Read Request Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2023-39179 \nPublished : Nov. 18, 2024, 10:15 a.m. | 46\u00a0minutes ago \nDescription : A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T12:22:17.000000Z"}, {"uuid": "7ad7a7cb-b782-4a31-867b-5fa9b13697ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3917", "type": "seen", "source": "https://t.me/cibsecurity/71264", "content": "\u203c CVE-2023-3917 \u203c\n\nDenial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-29T12:37:43.000000Z"}, {"uuid": "a001bcd5-49be-4ae5-8d4a-ffc111cc6e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39174", "type": "seen", "source": "https://t.me/cibsecurity/67238", "content": "\u203c CVE-2023-39174 \u203c\n\nIn JetBrains TeamCity before 2023.05.2 a ReDoS attack was possible via integration with issue trackers\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-25T18:26:53.000000Z"}, {"uuid": "b2322906-08d6-42ec-976f-373e2b5b203c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39175", "type": "seen", "source": "https://t.me/cibsecurity/67244", "content": "\u203c CVE-2023-39175 \u203c\n\nIn JetBrains TeamCity before 2023.05.2 reflected XSS via GitHub integration was possible\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-25T18:26:59.000000Z"}]}