{"vulnerability": "CVE-2023-5244", "sightings": [{"uuid": "2d59373c-150b-4bba-aaac-0c4b65730056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4dktewuu626", "content": "", "creation_timestamp": "2025-10-29T13:34:56.306111Z"}, {"uuid": "ca68eeaa-e992-4c25-8ccc-8626ac94fde8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52442", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4dkzdywck2b", "content": "", "creation_timestamp": "2025-10-29T13:38:16.652217Z"}, {"uuid": "13b5493e-105e-41cc-9e11-d6ae33695cb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52440", "type": "seen", "source": "https://gist.github.com/Darkcrai86/7a0cc78044d21e5ac83881bd0f5da524", "content": "", "creation_timestamp": "2025-09-16T08:23:58.000000Z"}, {"uuid": "f5e2298d-1413-464d-99b4-808bbd463481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52447", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15431", "content": "\u200aPoC Exploit Releases for CVE-2023-52447: A Linux Kernel Flaw Enabling Container Escape\n\nhttps://securityonline.info/poc-exploit-releases-for-cve-2023-52447-a-linux-kernel-flaw-enabling-container-escape/", "creation_timestamp": "2024-10-08T14:31:02.000000Z"}, {"uuid": "1a1a2d67-59ab-4367-880e-8366a149b09a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52440", "type": "seen", "source": "https://bsky.app/profile/linkersec.bsky.social/post/3m265zm4vk22s", "content": "", "creation_timestamp": "2025-10-01T23:12:07.047049Z"}, {"uuid": "e8f068b9-8da4-4b9e-b9f9-d569d18fde0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5244", "type": "published-proof-of-concept", "source": "Telegram/Xk59uxg1teZsUrHocIGf0m6NLMISafecQ2MwzsJn3Hzb-w", "content": "", "creation_timestamp": "2023-10-24T19:46:01.000000Z"}, {"uuid": "1aa7ab42-b672-4a56-9122-c3a022a8aaf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://t.me/arpsyndicate/3943", "content": "#ExploitObserverAlert\n\nCVE-2023-52441\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52441. In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix out of bounds in init_smb2_rsp_hdr()  If client send smb2 negotiate request and then send smb1 negotiate request, init_smb2_rsp_hdr is called for smb1 negotiate request since need_neg is set to false. This patch ignore smb1 packets after -&gt;need_neg is set to false.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-22T04:43:10.000000Z"}, {"uuid": "3d7b2899-effe-4789-851f-ad6b2556b6c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52440", "type": "seen", "source": "https://t.me/arpsyndicate/3933", "content": "#ExploitObserverAlert\n\nCVE-2023-52440\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52440. In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()  If authblob-&gt;SessionKey.Length is bigger than session key size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes. cifs_arc4_crypt copy to session key array from SessionKey from client.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-22T04:30:00.000000Z"}, {"uuid": "85964b94-47af-48b9-a4b0-1edc231058ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52442", "type": "seen", "source": "https://t.me/arpsyndicate/3906", "content": "#ExploitObserverAlert\n\nCVE-2023-52442\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52442. In the Linux kernel, the following vulnerability has been resolved:  ksmbd: validate session id and tree id in compound request  `smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session() will always return the first request smb2 header in a compound request. if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will return 0, i.e. The tree id check is skipped. This patch use ksmbd_req_buf_next() to get current command in compound.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-22T03:55:26.000000Z"}, {"uuid": "b1b0d3ed-4b60-48f7-bc0e-d8216407746c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5244", "type": "seen", "source": "https://t.me/cibsecurity/71168", "content": "\u203c CVE-2023-5244 \u203c\n\nCross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 2.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-28T07:46:40.000000Z"}, {"uuid": "a05fff52-c99c-4a16-ace1-999166512ab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5244", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1269", "content": "", "creation_timestamp": "2023-10-22T02:49:21.000000Z"}, {"uuid": "05acf49b-246a-4428-bc89-bd61d6a1811b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://t.me/ctinow/189386", "content": "https://ift.tt/AWgRh48\nCVE-2023-52441", "creation_timestamp": "2024-02-21T09:26:55.000000Z"}, {"uuid": "9ea3ee35-e757-466a-b22f-095971a0fac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52440", "type": "seen", "source": "https://t.me/ctinow/189385", "content": "https://ift.tt/wufo4IV\nCVE-2023-52440", "creation_timestamp": "2024-02-21T09:26:55.000000Z"}, {"uuid": "0f219796-6e03-4ae5-84c1-25d229228629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52442", "type": "seen", "source": "https://t.me/ctinow/189381", "content": "https://ift.tt/sEnDyWj\nCVE-2023-52442", "creation_timestamp": "2024-02-21T09:21:26.000000Z"}, {"uuid": "0a9ce5c6-3131-4d89-98f8-c94882071b12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52440", "type": "seen", "source": "https://t.me/ctinow/189379", "content": "https://ift.tt/wufo4IV\nCVE-2023-52440", "creation_timestamp": "2024-02-21T09:21:24.000000Z"}, {"uuid": "b04088fc-d32e-412b-84c2-193d69d6e8af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://t.me/ctinow/189380", "content": "https://ift.tt/AWgRh48\nCVE-2023-52441", "creation_timestamp": "2024-02-21T09:21:25.000000Z"}, {"uuid": "8f22af10-5574-4cf3-a5de-60b44bc00e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52442", "type": "seen", "source": "https://t.me/ctinow/189387", "content": "https://ift.tt/sEnDyWj\nCVE-2023-52442", "creation_timestamp": "2024-02-21T09:26:56.000000Z"}, {"uuid": "76e8e98c-132e-496b-85f8-9305eaf54d4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52448", "type": "seen", "source": "https://t.me/ctinow/191800", "content": "https://ift.tt/MUK0arV\nCVE-2023-52448", "creation_timestamp": "2024-02-23T15:11:35.000000Z"}, {"uuid": "49c616d2-6651-49d7-ae8d-a884a4cee952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52446", "type": "seen", "source": "https://t.me/ctinow/191802", "content": "https://ift.tt/THu3laD\nCVE-2023-52446", "creation_timestamp": "2024-02-23T15:11:37.000000Z"}, {"uuid": "2f574751-2506-46d9-8ed4-6b8c2e3b2474", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52447", "type": "seen", "source": "https://t.me/ctinow/191801", "content": "https://ift.tt/SAKNxfq\nCVE-2023-52447", "creation_timestamp": "2024-02-23T15:11:35.000000Z"}, {"uuid": "4e635f21-d9a1-482d-9ce6-4ec41bbe541c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52449", "type": "seen", "source": "https://t.me/ctinow/191799", "content": "https://ift.tt/LvPskoH\nCVE-2023-52449", "creation_timestamp": "2024-02-23T15:11:34.000000Z"}, {"uuid": "3689811a-0d11-484b-b9db-267135d020b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52448", "type": "seen", "source": "https://t.me/ctinow/191024", "content": "https://ift.tt/tHoeGbI\nCVE-2023-52448", "creation_timestamp": "2024-02-22T18:54:02.000000Z"}, {"uuid": "7158831e-690b-4cdb-945b-49f11c55c5f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52449", "type": "seen", "source": "https://t.me/ctinow/191005", "content": "https://ift.tt/81iBhqj\nCVE-2023-52449", "creation_timestamp": "2024-02-22T18:53:35.000000Z"}, {"uuid": "b6588e1f-5a57-4847-abfb-497c81a2fc91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52446", "type": "seen", "source": "https://t.me/ctinow/191022", "content": "https://ift.tt/is2tHky\nCVE-2023-52446", "creation_timestamp": "2024-02-22T18:54:00.000000Z"}, {"uuid": "0d88a84b-e07b-4f70-8f81-06efafb959a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52445", "type": "seen", "source": "https://t.me/ctinow/191021", "content": "https://ift.tt/8BsO4Xe\nCVE-2023-52445", "creation_timestamp": "2024-02-22T18:53:59.000000Z"}, {"uuid": "bd43ef1e-4c44-4184-9e5d-1af7fcf3efb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52444", "type": "seen", "source": "https://t.me/ctinow/191020", "content": "https://ift.tt/K5uIWHQ\nCVE-2023-52444", "creation_timestamp": "2024-02-22T18:53:59.000000Z"}, {"uuid": "8b604c65-f06d-4085-a437-c8c302aea88f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52443", "type": "seen", "source": "https://t.me/ctinow/191019", "content": "https://ift.tt/SIJTXuP\nCVE-2023-52443", "creation_timestamp": "2024-02-22T18:53:54.000000Z"}, {"uuid": "0ebaa2b7-e08d-4640-a78c-af3d76c4c7c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52447", "type": "published-proof-of-concept", "source": "https://t.me/god_of_server/4", "content": "#Exploit\n1. CVE-2024-42640:\nUnauthenticated RCE via Angular-Base64-Upload Library\nhttps://github.com/rvizx/CVE-2024-42640\n\n2. CVE-2024-37404:\nIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection\nhttps://blog.amberwolf.com/blog/2024/october/cve-2024-37404-ivanti-connect-secure-authenticated-rce-via-openssl-crlf-injection\n\n3. CVE-2023-52447:\nLinux Kernel BPF memory corruption\nhttps://github.com/google/security-research/tree/master/pocs/linux8 /kernelctf/CVE-2023-52447_cos\n\nHonestly, I've used that number 1 angular method is almost like node.js with rce. \ud83d\ude07", "creation_timestamp": "2024-10-24T06:17:45.000000Z"}, {"uuid": "c9d748c0-19b8-4e8a-82cd-fe48a9cd5edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52447", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11280", "content": "#exploit\n1. CVE-2024-42640:\nUnauthenticated RCE via Angular-Base64-Upload Library\nhttps://github.com/rvizx/CVE-2024-42640\n\n2. CVE-2024-37404:\nIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection\nhttps://blog.amberwolf.com/blog/2024/october/cve-2024-37404-ivanti-connect-secure-authenticated-rce-via-openssl-crlf-injection\n\n3. CVE-2023-52447:\nLinux Kernel BPF memory corruption\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-52447_cos", "creation_timestamp": "2024-10-14T17:10:12.000000Z"}, {"uuid": "e13713bf-2fa7-41d1-8ce9-b88edad5f445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52447", "type": "published-proof-of-concept", "source": "https://t.me/god_of_server/9", "content": "#exploit\n1. CVE-2024-42640:\nUnauthenticated RCE via Angular-Base64-Upload Library\nhttps://github.com/rvizx/CVE-2024-42640\n\n2. CVE-2024-37404:\nIvanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection\nhttps://blog.amberwolf.com/blog/2024/october/cve-2024-37404-ivanti-connect-secure-authenticated-rce-via-openssl-crlf-injection\n\n3. CVE-2023-52447:\nLinux Kernel BPF memory corruption\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2023-52447_cos\n\n\nGood luck bro ...", "creation_timestamp": "2024-10-26T13:59:22.000000Z"}]}