{"vulnerability": "CVE-2023-39943", "sightings": [{"uuid": "1dc883ad-79a5-4950-8e46-61ba5014ee0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947969898021530", "content": "", "creation_timestamp": "2025-02-04T22:27:17.294039Z"}, {"uuid": "456e838c-9287-4d5f-b40c-02fd5a9178ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf6rw6zjj2e", "content": "", "creation_timestamp": "2025-02-04T23:15:37.849051Z"}, {"uuid": "66514139-b21d-4fcb-8c44-ea2571b7a230", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcherh42z", "content": "", "creation_timestamp": "2025-02-05T02:23:53.220865Z"}, {"uuid": "ca1b435c-32c4-4cd2-a3b7-3e0e18372824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "https://t.me/cvedetector/17265", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-39943 - Ashlar-Vellum Cobalt Buffer Overflow (Arbitrary Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2023-39943 \nPublished : Feb. 4, 2025, 11:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T03:16:29.000000Z"}, {"uuid": "ee408679-96d9-448c-a54f-0a7ad4871577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39943", "type": "seen", "source": "Telegram/D7bBXtcVpHxI8-fHdus0nvuSF5moSJ8nmoXfRrQPvGYebZUE", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}]}