{"vulnerability": "CVE-2023-46316", "sightings": [{"uuid": "1f2d9701-0933-4158-b156-678e0e7f86f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46316", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/78", "content": "CVE-2023-46316:\nTraceroute Privilege Escalation\nhttps://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html\n\nLinux Kernel GSM Multiplexing Race Condition LPE Vulnerability\nhttps://github.com/Nassim-Asrir/ZDI-24-020\n]-&gt; scripts for automatically extracting symbol offsets for Ubuntu/CentOS/RHEL kernels:\nhttps://github.com/Nassim-Asrir/ZDI-24-020/tree/main/symbols", "creation_timestamp": "2024-01-23T18:51:28.000000Z"}, {"uuid": "e6fb703b-db7d-4b3c-ad77-db9e574e5dea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-46316", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "51d711d6-b313-4ce5-be44-e7d39a068d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46316", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2557", "content": "#exploit\n1. CVE-2023-46316:\nTraceroute Privilege Escalation\nhttps://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html\n\n2. CVE-2023-6546:\nLinux Kernel GSM Multiplexing Race Condition LPE Vulnerability\nhttps://github.com/Nassim-Asrir/ZDI-24-020\n]-&gt; scripts for automatically extracting symbol offsets for Ubuntu/CentOS/RHEL kernels:\nhttps://github.com/Nassim-Asrir/ZDI-24-020/tree/main/symbols", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}, {"uuid": "c7b87b14-78f7-4de2-9154-d201d180e2a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46316", "type": "seen", "source": "https://t.me/arpsyndicate/737", "content": "#ExploitObserverAlert\n\nCVE-2023-46316\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-46316. In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-11-29T12:57:36.000000Z"}, {"uuid": "5b8ae215-cfe8-450c-8034-fd3fe61f66c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46316", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9835", "content": "#exploit\n1. CVE-2023-46316:\nTraceroute Privilege Escalation\nhttps://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html\n\n2. CVE-2023-6546:\nLinux Kernel GSM Multiplexing Race Condition LPE Vulnerability\nhttps://github.com/Nassim-Asrir/ZDI-24-020\n]-&gt; scripts for automatically extracting symbol offsets for Ubuntu/CentOS/RHEL kernels:\nhttps://github.com/Nassim-Asrir/ZDI-24-020/tree/main/symbols", "creation_timestamp": "2025-04-24T03:08:34.000000Z"}]}