{"vulnerability": "CVE-2023-40303", "sightings": [{"uuid": "d6bc187a-71b2-4733-b97d-0bc4cb1b53a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40303", "type": "seen", "source": "https://t.me/cibsecurity/68429", "content": "\u203c CVE-2023-40303 \u203c\n\nGNU inetutils through 2.4 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-14T12:19:16.000000Z"}, {"uuid": "7ecc842d-e127-4a84-8408-a0509d4f84d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40303", "type": "seen", "source": "https://gist.github.com/Darkcrai86/01ff439faecb190b0ea8574478721fa6", "content": "", "creation_timestamp": "2025-09-29T07:57:52.000000Z"}]}