{"vulnerability": "CVE-2023-52441", "sightings": [{"uuid": "2d59373c-150b-4bba-aaac-0c4b65730056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4dktewuu626", "content": "", "creation_timestamp": "2025-10-29T13:34:56.306111Z"}, {"uuid": "1aa7ab42-b672-4a56-9122-c3a022a8aaf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://t.me/arpsyndicate/3943", "content": "#ExploitObserverAlert\n\nCVE-2023-52441\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52441. In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix out of bounds in init_smb2_rsp_hdr()  If client send smb2 negotiate request and then send smb1 negotiate request, init_smb2_rsp_hdr is called for smb1 negotiate request since need_neg is set to false. This patch ignore smb1 packets after -&gt;need_neg is set to false.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-22T04:43:10.000000Z"}, {"uuid": "05acf49b-246a-4428-bc89-bd61d6a1811b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://t.me/ctinow/189386", "content": "https://ift.tt/AWgRh48\nCVE-2023-52441", "creation_timestamp": "2024-02-21T09:26:55.000000Z"}, {"uuid": "b04088fc-d32e-412b-84c2-193d69d6e8af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52441", "type": "seen", "source": "https://t.me/ctinow/189380", "content": "https://ift.tt/AWgRh48\nCVE-2023-52441", "creation_timestamp": "2024-02-21T09:21:25.000000Z"}]}