{"vulnerability": "CVE-2023-5178", "sightings": [{"uuid": "2a82c1d7-b28a-4332-9166-5d52ca54a055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a013e077-634e-4cac-ae74-5be69c5959a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51780", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a003def3-c6b6-4e98-9e5f-dec5f4d6b892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "seen", "source": "https://t.me/ap_security/136", "content": "\ud83c\udf10\u0412 Linux-\u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 nvmet-tcp \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0433\u0440\u043e\u0437\u044f\u0449\u0430\u044f RCE\n\n\ud83d\udd24CVE-2023-5178 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 (use-after-free). \u041f\u0440\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nvmet_tcp_free_crypto\n\n\ud83d\udd24\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u043e\u0439 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438. \u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438\u043b\u0438 RCE\n\n\ud83d\udd24\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0446\u0435\u043d\u0435\u043d\u0430 \u043a\u0430\u043a \u043e\u0447\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u0430\u044f (8,8 \u0431\u0430\u043b\u043b\u0430 CVSS)\n\n#cve #itnews #infosec", "creation_timestamp": "2023-10-17T11:54:14.000000Z"}, {"uuid": "4da49e3e-9c7d-4fc6-b1ac-e3cedb331f9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51782", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "b36045db-86f2-4042-98d0-18014a6c80b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51781", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a9974ba7-daa2-4ee0-93e7-ccda2f6ef662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51781", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3mfaonwwv7a32", "content": "", "creation_timestamp": "2026-02-19T22:52:30.266363Z"}, {"uuid": "b9700119-fe6e-4a07-ae0f-a3304cd8793d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "seen", "source": "https://t.me/ap_security/194", "content": "\ud83c\udf10\u0412 Linux-\u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 nvmet-tcp \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0433\u0440\u043e\u0437\u044f\u0449\u0430\u044f RCE\n\n\ud83d\udd24CVE-2023-5178 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 (use-after-free). \u041f\u0440\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u0432\u044b\u0437\u043e\u0432\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nvmet_tcp_free_crypto\n\n\ud83d\udd24\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u043e\u0439 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438. \u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438\u043b\u0438 RCE\n\n\ud83d\udd24\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0446\u0435\u043d\u0435\u043d\u0430 \u043a\u0430\u043a \u043e\u0447\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u0430\u044f (8,8 \u0431\u0430\u043b\u043b\u0430 CVSS)\n\n#cve #itnews #infosec", "creation_timestamp": "2023-10-17T11:54:14.000000Z"}, {"uuid": "a65f9d23-6995-4259-a4be-433226373abe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51785", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4347", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51785\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.9.0, the attackers\u00a0can make a arbitrary file read attack using mysql driver.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.\n\n[1]\u00a0 https://github.com/apache/inlong/pull/9331\n\ud83d\udccf Published: 2024-01-03T12:30:21Z\n\ud83d\udccf Modified: 2025-02-13T19:30:05Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-51785\n2. https://github.com/apache/inlong/pull/9331\n3. https://github.com/apache/inlong/commit/d674bfe28416aff728eabafc1f6b8bb9ba5a5b8e\n4. https://github.com/apache/inlong\n5. https://lists.apache.org/thread/g0yjmtjqvp8bnf1j0tdsk0nhfozjdjno\n6. http://www.openwall.com/lists/oss-security/2024/01/03/2", "creation_timestamp": "2025-02-13T20:15:55.000000Z"}, {"uuid": "165fec98-3fb9-4213-bed8-ca87f0b4d5be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "seen", "source": "https://t.me/cibsecurity/73352", "content": "\u203c CVE-2023-5178 \u203c\n\nA use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation in case that the attacker already has local privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-01T19:22:17.000000Z"}, {"uuid": "ca439837-1355-4069-aa5e-2ba37cc5e895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51785", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/74314", "content": "\u203c\ufe0fCVE-2023-51785\u203c\ufe0f\n\nDeserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong from 1.7.0 through 1.9.0, the attackers\u00a0can make a arbitrary file read attack using mysql driver.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherrypick 1 to solve it.  1\u00a0 httpsgithub.comapacheinlongpull9331   \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:35:24.000000Z"}, {"uuid": "d50d886b-3c1b-41e1-a289-85a355091edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51784", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/74313", "content": "\u203c\ufe0fCVE-2023-51784\u203c\ufe0f\n\nImproper Control of Generation of Code 'Code Injection' vulnerability in Apache InLong.This issue affects Apache InLong from 1.5.0 through 1.9.0, which could lead to Remote Code Execution.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherrypick 1 to solve it.  1  httpsgithub.comapacheinlongpull9329   \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:35:19.000000Z"}, {"uuid": "35813f34-2489-491d-bf88-c9530bbf7d4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51784", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4346", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-51784\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.\n\n[1]  https://github.com/apache/inlong/pull/9329\n\ud83d\udccf Published: 2024-01-03T12:30:21Z\n\ud83d\udccf Modified: 2025-02-13T19:30:07Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-51784\n2. https://github.com/apache/inlong/pull/9329\n3. https://github.com/apache/inlong/commit/1607837be28438c0ccae8da15afb653f2afed090\n4. https://github.com/apache/inlong\n5. https://lists.apache.org/thread/4nxbyl6mh5jgh0plk0qposbxwn6w9h8j\n6. http://www.openwall.com/lists/oss-security/2024/01/03/1", "creation_timestamp": "2025-02-13T20:15:50.000000Z"}, {"uuid": "c39e2195-6b4a-4268-9291-1009957ad9b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/91", "content": "MediaTek WLAN Driver Memory Corruption\nhttps://packetstormsecurity.com/files/177011/MediaTek-WLAN-Driver-Memory-Corruption.html\n\nCVE-2023-5178:\nNVMe-oF TCP vulnerability\nhttps://github.com/rockrid3r/CVE-2023-5178", "creation_timestamp": "2024-02-09T14:00:17.000000Z"}, {"uuid": "8a7d5943-684c-4757-be4d-c7f661a3017b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51786", "type": "seen", "source": "https://t.me/ctinow/201997", "content": "https://ift.tt/Auogndz\nCVE-2023-51786", "creation_timestamp": "2024-03-07T02:26:57.000000Z"}, {"uuid": "5c2c70ee-336b-4f8a-a5fa-0f9f29c6b7ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51785", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2477", "content": "#ExploitObserverAlert\n\nCVE-2023-51785\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-51785. Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.9.0, the attackers\u00a0can make a arbitrary file read attack using mysql driver.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.  [1]\u00a0 https://github.com/apache/inlong/pull/9331", "creation_timestamp": "2024-01-05T13:45:20.000000Z"}, {"uuid": "8c0aa691-32ed-4ac1-a207-dac681bc08d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51784", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2474", "content": "#ExploitObserverAlert\n\nCVE-2023-51784\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-51784. Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.  [1]  https://github.com/apache/inlong/pull/9329", "creation_timestamp": "2024-01-05T13:14:09.000000Z"}, {"uuid": "3caa15b0-fe8f-42a5-9d0f-3760c5f6dc82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "seen", "source": "https://t.me/arpsyndicate/696", "content": "#ExploitObserverAlert\n\nCVE-2023-5178\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5178. A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation in case that the attacker already has local privileges.\n\nFIRST-EPSS: 0.003610000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-29T07:54:21.000000Z"}, {"uuid": "d5bfe694-3c2c-43e5-a6ed-e5c8c2bb27aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "seen", "source": "https://t.me/arpsyndicate/758", "content": "#ExploitObserverAlert\n\nCVE-2023-5178\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-5178. A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation in case that the attacker already has local privileges.\n\nFIRST-EPSS: 0.003610000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-29T15:28:00.000000Z"}, {"uuid": "8892466f-2d34-42ac-9f01-ac4e245cea8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51786", "type": "seen", "source": "https://t.me/ctinow/202009", "content": "https://ift.tt/Auogndz\nCVE-2023-51786", "creation_timestamp": "2024-03-07T02:27:14.000000Z"}, {"uuid": "ee0d0737-ea2a-4a44-a9b9-e673b5e98c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51785", "type": "seen", "source": "https://t.me/ctinow/172099", "content": "https://ift.tt/7nBzDqS\nCVE-2023-51785 | Apache InLong up to 1.9.0 MySQL Driver deserialization", "creation_timestamp": "2024-01-23T16:26:56.000000Z"}, {"uuid": "686b90af-6478-4e8b-902b-bb131a75cadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51784", "type": "seen", "source": "https://t.me/ctinow/172098", "content": "https://ift.tt/BekfhzM\nCVE-2023-51784 | Apache InLong up to 1.9.0 code injection", "creation_timestamp": "2024-01-23T16:26:55.000000Z"}, {"uuid": "3c4f9601-7535-4d95-9d7d-f0e44217b188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51785", "type": "seen", "source": "https://t.me/ctinow/162313", "content": "https://ift.tt/YQJf6vK\nCVE-2023-51785", "creation_timestamp": "2024-01-03T11:26:11.000000Z"}, {"uuid": "84a830e7-0005-4fdc-8d17-106da1217da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51784", "type": "seen", "source": "https://t.me/ctinow/162312", "content": "https://ift.tt/Kk4Hlmz\nCVE-2023-51784", "creation_timestamp": "2024-01-03T11:26:10.000000Z"}, {"uuid": "0e78ef26-a0d8-43f5-a3cd-4a6f10267c98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51782", "type": "seen", "source": "https://t.me/ctinow/166818", "content": "https://ift.tt/l02GRrN\nCVE-2023-51782", "creation_timestamp": "2024-01-11T20:46:36.000000Z"}, {"uuid": "db7a7539-8ea5-412e-90e5-3303a5d7887f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51781", "type": "seen", "source": "https://t.me/ctinow/166817", "content": "https://ift.tt/tAEgoJN\nCVE-2023-51781", "creation_timestamp": "2024-01-11T20:46:34.000000Z"}, {"uuid": "7eb41a20-ac24-4e68-86d5-4228e9ddedce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51780", "type": "seen", "source": "https://t.me/ctinow/166816", "content": "https://ift.tt/sPgvRAT\nCVE-2023-51780", "creation_timestamp": "2024-01-11T20:46:33.000000Z"}, {"uuid": "96855c41-f12d-48f7-b1d8-d6eaf616e129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51780", "type": "seen", "source": "https://t.me/ctinow/165840", "content": "https://ift.tt/n8TKGbM\nCVE-2023-51780", "creation_timestamp": "2024-01-10T15:02:48.000000Z"}, {"uuid": "6eb340f3-d99b-49df-b4f5-6381e11fe50a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51781", "type": "seen", "source": "https://t.me/ctinow/165836", "content": "https://ift.tt/pKYNq02\nCVE-2023-51781", "creation_timestamp": "2024-01-10T14:46:51.000000Z"}, {"uuid": "603be5f2-10f5-4c94-928b-4e7346dee45b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5178", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9941", "content": "#exploit\n1. MediaTek WLAN Driver Memory Corruption\nhttps://packetstormsecurity.com/files/177011/MediaTek-WLAN-Driver-Memory-Corruption.html\n\n2. CVE-2023-5178:\nNVMe-oF TCP vulnerability\nhttps://github.com/rockrid3r/CVE-2023-5178", "creation_timestamp": "2024-02-09T21:04:56.000000Z"}]}