{"vulnerability": "CVE-2023-3993", "sightings": [{"uuid": "ad8466d8-50ca-48e2-9498-08872fffe702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39933", "type": "seen", "source": "https://t.me/ctinow/210117", "content": "https://ift.tt/j1sVnxP\nCVE-2023-39933", "creation_timestamp": "2024-03-18T02:26:47.000000Z"}, {"uuid": "3d547fa6-4b93-4071-b9ee-a068e9d9fb0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39933", "type": "seen", "source": "https://t.me/ctinow/210110", "content": "https://ift.tt/j1sVnxP\nCVE-2023-39933", "creation_timestamp": "2024-03-18T02:21:49.000000Z"}, {"uuid": "e882b251-9eca-46d2-8dc8-1c8eba657cc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39932", "type": "seen", "source": "https://t.me/ctinow/184816", "content": "https://ift.tt/lQj4Cm8\nCVE-2023-39932", "creation_timestamp": "2024-02-14T17:03:11.000000Z"}, {"uuid": "35287d9f-f414-4b5a-9f95-96a3dc5e8305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39936", "type": "seen", "source": "https://t.me/cibsecurity/73010", "content": "\u203c CVE-2023-39936 \u203c\n\nIn Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-27T00:18:09.000000Z"}, {"uuid": "9d3a971e-4690-4596-bf0f-0065dfccc34a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39932", "type": "seen", "source": "https://t.me/ctinow/201399", "content": "https://ift.tt/8bKmvXJ\nCVE-2023-39932 | Intel SUR for Gameplay Software prior 2.0.1901 uncontrolled search path (intel-sa-01004)", "creation_timestamp": "2024-03-06T14:41:27.000000Z"}, {"uuid": "dbd56e09-c6ee-4161-9639-8a1b13f3b54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39938", "type": "seen", "source": "https://t.me/cibsecurity/69836", "content": "\u203c CVE-2023-39938 \u203c\n\nReflected cross-site scripting vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to inject an arbitrary script.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T12:17:11.000000Z"}, {"uuid": "8d15e15d-8470-4b5f-8b01-32fd204b938c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39935", "type": "seen", "source": "https://t.me/cibsecurity/69985", "content": "\u203c CVE-2023-39935 \u203c\n\nArcher C5400 firmware versions prior to 'Archer C5400(JP)_V2_230506' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T14:17:49.000000Z"}, {"uuid": "81d63962-4d01-40f5-9b79-fa10ac0664fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39939", "type": "seen", "source": "https://t.me/cibsecurity/68872", "content": "\u203c CVE-2023-39939 \u203c\n\nSQL injection vulnerability in LuxCal Web Calendar prior to 5.2.3M (MySQL version) and LuxCal Web Calendar prior to 5.2.3L (SQLite version) allows a remote unauthenticated attacker to execute arbitrary queries against the database and obtain or alter the information in it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-21T12:40:50.000000Z"}, {"uuid": "8c5d068b-0eb3-45e2-a0f3-773209b6ca57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3993", "type": "seen", "source": "https://t.me/cibsecurity/67559", "content": "\u203c CVE-2023-3993 \u203c\n\nAn issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Access tokens may have been logged when a query was made to a specific endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T07:39:14.000000Z"}]}