{"vulnerability": "CVE-2023-3994", "sightings": [{"uuid": "456e838c-9287-4d5f-b40c-02fd5a9178ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf6rw6zjj2e", "content": "", "creation_timestamp": "2025-02-04T23:15:37.849051Z"}, {"uuid": "66514139-b21d-4fcb-8c44-ea2571b7a230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcherh42z", "content": "", "creation_timestamp": "2025-02-05T02:23:53.220865Z"}, {"uuid": "1dc883ad-79a5-4950-8e46-61ba5014ee0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947969898021530", "content": "", "creation_timestamp": "2025-02-04T22:27:17.294039Z"}, {"uuid": "ca9ef71f-ad3a-4b5e-8ddc-3dd5553c5e5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39941", "type": "seen", "source": "https://t.me/ctinow/201395", "content": "https://ift.tt/7J23yln\nCVE-2023-39941 | Intel SUR Software prior 2.4.10587 denial of service (intel-sa-00998)", "creation_timestamp": "2024-03-06T14:41:23.000000Z"}, {"uuid": "ee408679-96d9-448c-a54f-0a7ad4871577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "Telegram/D7bBXtcVpHxI8-fHdus0nvuSF5moSJ8nmoXfRrQPvGYebZUE", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}, {"uuid": "ca1b435c-32c4-4cd2-a3b7-3e0e18372824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://t.me/cvedetector/17265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-39943 - Ashlar-Vellum Cobalt Buffer Overflow (Arbitrary Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2023-39943 \nPublished : Feb. 4, 2025, 11:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T03:16:29.000000Z"}, {"uuid": "c072d3f4-aaca-4e94-ab16-ed6f6ce878fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39944", "type": "seen", "source": "https://t.me/cibsecurity/68815", "content": "\u203c CVE-2023-39944 \u203c\n\nOS command injection vulnerability in WRC-F1167ACF all versions, and WRC-1750GHBK all versions allows an attacker who can access the product to execute an arbitrary OS command by sending a specially crafted request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T14:38:10.000000Z"}, {"uuid": "883059f9-623d-45a7-8248-9eae1835e466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39941", "type": "seen", "source": "https://t.me/ctinow/184817", "content": "https://ift.tt/zDKhjIC\nCVE-2023-39941", "creation_timestamp": "2024-02-14T17:03:12.000000Z"}, {"uuid": "dbfe3441-4cd7-49d4-9376-8d5b36eb187a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39949", "type": "seen", "source": "https://t.me/cibsecurity/68349", "content": "\u203c CVE-2023-39949 \u203c\n\neprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.9.1 and 2.6.5, improper validation of sequence numbers may lead to remotely reachable assertion failure. This can remotely crash any Fast-DDS process. Versions 2.9.1 and 2.6.5 contain a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:16:52.000000Z"}, {"uuid": "3699ba9a-ba1f-41c7-9935-031d4b61b079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39948", "type": "seen", "source": "https://t.me/cibsecurity/68346", "content": "\u203c CVE-2023-39948 \u203c\n\neprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.10.0 and 2.6.5, the `BadParamException` thrown by Fast CDR is not caught in Fast DDS. This can remotely crash any Fast DDS process. Versions 2.10.0 and 2.6.5 contain a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:16:49.000000Z"}, {"uuid": "81d12541-d770-4521-a038-40a15c0acebd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39945", "type": "seen", "source": "https://t.me/cibsecurity/68366", "content": "\u203c CVE-2023-39945 \u203c\n\neprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.0, 2.10.2, 2.9.2, and 2.6.5, a data submessage sent to PDP port raises unhandled `BadParamException` in fastcdr, which in turn crashes fastdds. Versions 2.11.0, 2.10.2, 2.9.2, and 2.6.5 contain a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T18:22:49.000000Z"}, {"uuid": "c24c6dac-c903-4f79-8aad-096929b6f833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3994", "type": "seen", "source": "https://t.me/cibsecurity/67548", "content": "\u203c CVE-2023-3994 \u203c\n\nAn issue has been discovered in GitLab CE/EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T07:38:57.000000Z"}]}