{"vulnerability": "CVE-2023-52389", "sightings": [{"uuid": "65d36eb3-b012-4273-b74d-d8ebe99d923b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52389", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-08", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "0f9864f0-d35c-4440-8618-34fbc583fee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52389", "type": "seen", "source": "https://t.me/arpsyndicate/3292", "content": "#ExploitObserverAlert\n\nCVE-2023-52389\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-52389. UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.", "creation_timestamp": "2024-01-28T13:02:41.000000Z"}, {"uuid": "60dff8da-da44-439d-b36b-e14344af5496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52389", "type": "seen", "source": "https://t.me/ctinow/188085", "content": "https://ift.tt/C0Ksvye\nCVE-2023-52389 | POCO up to 1.11.8p1/1.12.5p1 UTF32Encoding.cpp convert stack-based overflow (Issue 4320)", "creation_timestamp": "2024-02-20T03:41:37.000000Z"}, {"uuid": "3f89f12e-dbf6-402c-8bd5-fa39d3a755bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52389", "type": "seen", "source": "https://t.me/ctinow/174618", "content": "https://ift.tt/4VfO7Ii\nCVE-2023-52389", "creation_timestamp": "2024-01-27T04:31:18.000000Z"}]}