{"vulnerability": "cve-2023-5235", "sightings": [{"uuid": "b4cad839-cc9e-4f11-8f29-f633b2877c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52358", "type": "seen", "source": "https://t.me/ctinow/187104", "content": "https://ift.tt/g7xIENK\nCVE-2023-52358", "creation_timestamp": "2024-02-18T04:31:52.000000Z"}, {"uuid": "a4f0590e-eddb-419f-b101-b2de677c2b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52357", "type": "seen", "source": "https://t.me/ctinow/187103", "content": "https://ift.tt/92oWsdU\nCVE-2023-52357", "creation_timestamp": "2024-02-18T04:31:51.000000Z"}, {"uuid": "d9d0481f-3eec-4aa0-bef3-f66e8abcf673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52354", "type": "seen", "source": "https://t.me/ctinow/186184", "content": "https://ift.tt/eglhExI\nCVE-2023-52354 | chasquid up to 1.12 SMTP injection", "creation_timestamp": "2024-02-16T08:46:11.000000Z"}, {"uuid": "e9230cb8-9466-48d1-b852-2ff447cbea59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52358", "type": "seen", "source": "https://t.me/ctinow/187094", "content": "https://ift.tt/g7xIENK\nCVE-2023-52358", "creation_timestamp": "2024-02-18T04:26:41.000000Z"}, {"uuid": "7a5bcdfc-4af4-4449-ae86-2913d802136d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52357", "type": "seen", "source": "https://t.me/ctinow/187093", "content": "https://ift.tt/92oWsdU\nCVE-2023-52357", "creation_timestamp": "2024-02-18T04:26:40.000000Z"}, {"uuid": "602aba97-4c74-4304-9669-6becd9ac9fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52355", "type": "seen", "source": "https://t.me/ctinow/187077", "content": "https://ift.tt/JXEw3cW\nCVE-2023-52355 | LibTIFF TIFFRasterScanlineSize64 resource consumption (Issue 621)", "creation_timestamp": "2024-02-17T23:51:06.000000Z"}, {"uuid": "570951ec-b507-4660-b515-2746d52ee11c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52356", "type": "seen", "source": "https://t.me/ctinow/187133", "content": "https://ift.tt/gj6ihNf\nCVE-2023-52356 | LibTIFF TIFFReadRGBATileExt denial of service (Issue 622)", "creation_timestamp": "2024-02-18T06:36:23.000000Z"}, {"uuid": "e9047b37-54c1-4704-a136-c59c7f39e03b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52353", "type": "seen", "source": "https://t.me/ctinow/186169", "content": "https://ift.tt/7Mak59w\nCVE-2023-52353 | mbed TLS up to 3.5.1 mbedtls_ssl_session_reset session fixiation (Issue 8654)", "creation_timestamp": "2024-02-16T08:16:35.000000Z"}, {"uuid": "2cd03af4-187b-40bf-a615-f92e3bc60b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5235", "type": "seen", "source": "https://t.me/ctinow/173471", "content": "https://ift.tt/SHv9D4T\nCVE-2023-5235 | Ovic Responsive WPBakery Plugin up to 1.2.8 on WordPress AJAX Action deserialization", "creation_timestamp": "2024-01-25T14:42:00.000000Z"}, {"uuid": "993ba95f-1fde-4d68-bd80-062927d1dbd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52355", "type": "seen", "source": "https://t.me/ctinow/177094", "content": "https://ift.tt/i1RoC34\nCVE-2023-52355 Exploit", "creation_timestamp": "2024-01-31T21:17:18.000000Z"}, {"uuid": "f045f77d-08d6-49a3-830e-c6c94aebc4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52354", "type": "seen", "source": "https://t.me/ctinow/171007", "content": "https://ift.tt/izLGsaJ\nCVE-2023-52354", "creation_timestamp": "2024-01-22T07:31:59.000000Z"}, {"uuid": "3c8934f1-bec4-45f2-a377-642cf3a72d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52353", "type": "seen", "source": "https://t.me/ctinow/170936", "content": "https://ift.tt/27M4KZb\nCVE-2023-52353", "creation_timestamp": "2024-01-22T00:22:10.000000Z"}, {"uuid": "12c3b260-53b5-48c2-9b4e-91c638d66362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52356", "type": "seen", "source": "https://t.me/ctinow/173800", "content": "https://ift.tt/tLVGMIJ\nCVE-2023-52356", "creation_timestamp": "2024-01-25T21:26:42.000000Z"}, {"uuid": "ec86f705-3f15-4534-82c3-d3a3e0f34567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52355", "type": "seen", "source": "https://t.me/ctinow/173799", "content": "https://ift.tt/mNRayVS\nCVE-2023-52355", "creation_timestamp": "2024-01-25T21:26:41.000000Z"}, {"uuid": "f6e77597-b076-4c71-806a-e80ea1573e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5235", "type": "seen", "source": "https://t.me/ctinow/164601", "content": "https://ift.tt/bMoKT42\nCVE-2023-5235", "creation_timestamp": "2024-01-08T20:26:59.000000Z"}, {"uuid": "4eba576b-ae48-4e90-b9b1-1df045cc83d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2023-52356", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mj5xwcy4yc2q", "content": "", "creation_timestamp": "2026-04-10T18:40:48.815551Z"}, {"uuid": "da321d3b-f154-4159-92f8-e8933984dd5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52355", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14528", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52355\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.\n\ud83d\udccf Published: 2024-01-25T20:03:35.031Z\n\ud83d\udccf Modified: 2025-05-02T17:06:07.869Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2023-52355\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2251326\n3. https://gitlab.com/libtiff/libtiff/-/issues/621", "creation_timestamp": "2025-05-02T17:16:30.000000Z"}, {"uuid": "3b980edb-287e-4a13-af60-8c5af454a529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5235", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18103", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5235\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Ovic Responsive WPBakery WordPress plugin before 1.2.9 does not limit which options can be updated via some of its AJAX actions, which may allow attackers with a subscriber+ account to update blog options, such as 'users_can_register' and 'default_role'. It also unserializes user input in the process, which may lead to Object Injection attacks.\n\ud83d\udccf Published: 2024-01-08T19:00:36.131Z\n\ud83d\udccf Modified: 2025-06-11T17:05:31.530Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/35c9a954-37fc-4818-a71f-34aaaa0fa3db", "creation_timestamp": "2025-06-11T17:34:32.000000Z"}, {"uuid": "728edda1-842c-48b8-922b-bdd559b7c9ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-52352", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9444", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52352\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Network Adapter Service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed\n\ud83d\udccf Published: 2024-04-08T02:21:17.681Z\n\ud83d\udccf Modified: 2025-03-28T19:11:14.459Z\n\ud83d\udd17 References:\n1. https://www.unisoc.com/en_us/secy/announcementDetail/1777143682512781313", "creation_timestamp": "2025-03-28T19:29:15.000000Z"}]}