{"vulnerability": "CVE-2023-3920", "sightings": [{"uuid": "cb5546b3-a78f-4cc8-87e8-87b309b786ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3920", "type": "seen", "source": "https://t.me/cibsecurity/71265", "content": "\u203c CVE-2023-3920 \u203c\n\nAn issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-29T12:37:44.000000Z"}, {"uuid": "f8f9b52f-d172-4927-a17a-98f2ad60ea11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39201", "type": "seen", "source": "https://t.me/cibsecurity/70359", "content": "\u203c CVE-2023-39201 \u203c\n\nUntrusted search path in CleanZoom before file date 07/24/2023 may allow a privileged user to conduct an escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T00:23:25.000000Z"}, {"uuid": "93d47b6a-cd24-4e83-b853-e63c8fa3cb03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39208", "type": "seen", "source": "https://t.me/cibsecurity/70350", "content": "\u203c CVE-2023-39208 \u203c\n\nImproper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T00:23:16.000000Z"}]}