{"vulnerability": "CVE-2023-5512", "sightings": [{"uuid": "447d4a5f-b9d6-4812-97fa-757302306379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5512", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5512\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI.\n\ud83d\udccf Published: 2023-12-15T16:03:00.260Z\n\ud83d\udccf Modified: 2025-05-22T04:09:31.308Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/427827\n2. https://hackerone.com/reports/2194607", "creation_timestamp": "2025-05-22T04:44:27.000000Z"}, {"uuid": "ff860abd-ac59-4890-9822-da68c9ea0c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5512", "type": "seen", "source": "https://t.me/ctinow/166619", "content": "https://ift.tt/vi1rNqk\nCVE-2023-5512 | GitLab Community Edition/Enterprise Edition prior 16.4.4/16.5.4/16.6.2 File Name code injection (Issue 427827)", "creation_timestamp": "2024-01-11T16:31:36.000000Z"}]}