{"vulnerability": "cve-2023-3397", "sightings": [{"uuid": "4ab50f13-021a-424b-a956-4beec483150c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33976", "type": "seen", "source": "https://t.me/cvedetector/2074", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-33976 - TensorFlow Array Ops Segfault Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-33976 \nPublished : July 30, 2024, 8:15 p.m. | 42\u00a0minutes ago \nDescription : TensorFlow is an end-to-end open source platform for machine learning. `array_ops.upper_bound` causes a segfault when not given a rank 2 tensor. The fix will be included in TensorFlow 2.13 and will also cherrypick this commit on TensorFlow 2.12. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T23:16:32.000000Z"}, {"uuid": "5c44106e-0873-416c-b356-2f01f247eda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3397", "type": "seen", "source": "https://t.me/cibsecurity/73388", "content": "\u203c CVE-2023-3397 \u203c\n\nA race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-01T23:22:02.000000Z"}, {"uuid": "212adbf2-67e6-40af-aa49-cc21b9efc21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33979", "type": "seen", "source": "Telegram/Pm9RlrdtVPA-wbfK6ER2dGw25X8I7Hf7YPxt15BaBoirTkWQ", "content": "", "creation_timestamp": "2025-03-08T04:34:57.000000Z"}, {"uuid": "cc4ba3bd-9265-4843-83be-97c4aee4754b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33972", "type": "seen", "source": "https://t.me/cibsecurity/71135", "content": "\u203c CVE-2023-33972 \u203c\n\nScylladb is a NoSQL data store using the seastar framework, compatible with Apache Cassandra. Authenticated users who are authorized to create tables in a keyspace can escalate their privileges to access a table in the same keyspace, even if they don't have permissions for that table. This issue has not yet been patched. A workaround to address this issue is to disable CREATE privileges on a keyspace, and create new tables on behalf of other users.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T22:35:59.000000Z"}, {"uuid": "45191509-ff8a-4c2a-ab7a-825dc11b1854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33975", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8434", "content": "#exploit\n1. CVE-2023-0455:\nBumsys Business Management System 1.0.3 - Shell Upload\nhttps://packetstormsecurity.com/files/172674\n\n2. CVE-2023-33975:\nRIOT-OS Code Execution Vulnerability\nhttps://github.com/RIOT-OS/RIOT/security/advisories/GHSA-f6ff-g7mh-58q4", "creation_timestamp": "2023-06-05T10:59:01.000000Z"}, {"uuid": "9edace46-8d64-4a99-84c2-63e3a8a609cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33977", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/505", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33977\n\ud83d\udd39 Description: Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded and Content-Security-Policy definition to prevent cross-site-scripting attacks. The upload validation checks were not 100% robust which left the possibility to circumvent them and upload a potentially dangerous file which allows execution of arbitrary JavaScript in the browser. Additionally we've discovered that Nginx's `proxy_pass` directive will strip some headers negating protections built into Kiwi TCMS when served behind a reverse proxy. This issue has been addressed in version 12.4. Users are advised to upgrade. Users unable to upgrade who are serving Kiwi TCMS behind a reverse proxy should make sure that additional header values are still passed to the client browser. If they aren't redefining them inside the proxy configuration.\n\ud83d\udccf Published: 2023-06-06T18:03:18.882Z\n\ud83d\udccf Modified: 2025-01-07T18:30:30.909Z\n\ud83d\udd17 References:\n1. https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2fqm-m4r2-fh98\n2. https://github.com/kiwitcms/Kiwi/commit/d789f4b51025de4f8c747c037d02e1b0da80b034\n3. https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf#L66-L68\n4. https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf#L87\n5. https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/", "creation_timestamp": "2025-01-07T18:37:38.000000Z"}, {"uuid": "4a43f92f-da27-45b7-a815-bc94817907b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33970", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/711", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33970\n\ud83d\udd39 Description: Kanboard is open source project management software that focuses on the Kanban methodology. A vulnerability related to a `missing access control` was found, which allows a User with the lowest privileges to leak all the tasks and projects titles within the software, even if they are not invited or it's a personal project. This could also lead to private/critical information being leaked if such information is in the title. This issue has been addressed in version 1.2.30. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udccf Published: 2023-06-05T19:54:38.686Z\n\ud83d\udccf Modified: 2025-01-08T16:01:46.073Z\n\ud83d\udd17 References:\n1. https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286\n2. https://github.com/kanboard/kanboard/commit/b501ef44bc28ee9cf603a4fa446ee121d66f652f", "creation_timestamp": "2025-01-08T16:14:49.000000Z"}, {"uuid": "f40e6e43-6b47-4463-85e3-dadcf6931942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33974", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1167", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33974\n\ud83d\udd39 Description: RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send multiple crafted frames to the device to trigger a race condition. The race condition invalidates assumptions about the program state and leads to an invalid memory access resulting in denial of service. This issue is patched in pull request 19679. There are no known workarounds.\n\ud83d\udccf Published: 2023-05-30T16:50:06.211Z\n\ud83d\udccf Modified: 2025-01-10T16:53:57.110Z\n\ud83d\udd17 References:\n1. https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-8m3w-mphf-wxm8\n2. https://github.com/RIOT-OS/RIOT/pull/19679\n3. https://github.com/RIOT-OS/RIOT/commit/31c6191f6196f1a05c9765cffeadba868e3b0723\n4. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L1717\n5. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L509\n6. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L617\n7. https://github.com/RIOT-OS/RIOT/blob/master/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L1586\n8. https://github.com/RIOT-OS/RIOT/blob/master/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L404", "creation_timestamp": "2025-01-10T17:03:37.000000Z"}, {"uuid": "f23f6a26-c6e2-4bf8-ac87-bd218dc9a389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33979", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33979\n\ud83d\udd39 Description: gpt_academic provides a graphical interface for ChatGPT/GLM. A vulnerability was found in gpt_academic 3.37 and prior. This issue affects some unknown processing of the component Configuration File Handler. The manipulation of the argument file leads to information disclosure. Since no sensitive files are configured to be off-limits, sensitive information files in some working directories can be read through the `/file` route, leading to sensitive information leakage. This affects users that uses file configurations via `config.py`, `config_private.py`, `Dockerfile`. A patch is available at commit 1dcc2873d2168ad2d3d70afcb453ac1695fbdf02. As a workaround, one may use environment variables instead of `config*.py` files to configure this project, or use docker-compose installation to configure this project.\n\ud83d\udccf Published: 2023-05-31T18:03:25.468Z\n\ud83d\udccf Modified: 2025-01-09T19:51:39.844Z\n\ud83d\udd17 References:\n1. https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-pg65-p24m-wf5g\n2. https://github.com/binary-husky/gpt_academic/commit/1dcc2873d2168ad2d3d70afcb453ac1695fbdf02", "creation_timestamp": "2025-01-09T20:15:54.000000Z"}, {"uuid": "8566a0f2-9964-41dc-bc11-21a2a5de8fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2023-3397", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "5326e10e-08f3-4bf2-b417-324bf5bab1ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33973", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1166", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33973\n\ud83d\udd39 Description: RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send a crafted frame which is forwarded by the device. During encoding of the packet a NULL pointer dereference occurs. This crashes the device leading to denial of service. A patch is available at pull request 19678. There are no known workarounds.\n\ud83d\udccf Published: 2023-05-30T16:18:04.163Z\n\ud83d\udccf Modified: 2025-01-10T16:54:29.703Z\n\ud83d\udd17 References:\n1. https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-r2pv-3jqc-vh7w\n2. https://github.com/RIOT-OS/RIOT/pull/19678\n3. https://github.com/RIOT-OS/RIOT/commit/c9d7863e5664a169035038628029bb07e090c5ff\n4. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1067\n5. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1495\n6. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1511\n7. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1644\n8. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1655", "creation_timestamp": "2025-01-10T17:03:35.000000Z"}, {"uuid": "06b11a8c-360e-414c-be1c-3d79c6edc662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33975", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1168", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33975\n\ud83d\udd39 Description: RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In version 2023.01 and prior, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. This issue is fixed in pull request 19680. As a workaround, disable support for fragmented IP datagrams.\n\ud83d\udccf Published: 2023-05-30T17:08:41.903Z\n\ud83d\udccf Modified: 2025-01-10T16:53:00.824Z\n\ud83d\udd17 References:\n1. https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-f6ff-g7mh-58q4\n2. https://github.com/RIOT-OS/RIOT/pull/19680\n3. https://github.com/RIOT-OS/RIOT/commit/1aeb90ee5555ae78b567a6365ae4ab71bfd1404b\n4. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L320\n5. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L388\n6. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L463\n7. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L467\n8. https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L480", "creation_timestamp": "2025-01-10T17:03:39.000000Z"}]}