{"uuid": "35016371-6eab-4f22-9d7b-1c58163003e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28653", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/502", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28653\n\ud83d\udd39 Description: \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nThe affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a use-after-free vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. \n\n \n\n \n\n \n\n\n\n \n\n\n\n\n\n\n\n\n\ud83d\udccf Published: 2023-06-06T16:42:49.346Z\n\ud83d\udccf Modified: 2025-01-07T18:34:18.182Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-04", "creation_timestamp": "2025-01-07T18:37:09.000000Z"}