{"vulnerability": "CVE-2023-5266", "sightings": [{"uuid": "80062bc5-7fa1-4751-8fbf-cb067ff810ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52664", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lwhluqui2w2q", "content": "", "creation_timestamp": "2025-08-15T19:33:05.697100Z"}, {"uuid": "e8dcf174-3ca7-41df-b5fd-32b29e0ccb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-52660", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "89a89f2e-d75d-4f0e-b3be-9b179c880ec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-52664", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "f06b358e-3745-44af-a41b-e0e202e73573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-52669", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "90b1983a-8474-4790-97de-cb1853a7699e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52664", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16991", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52664\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: eliminate double free in error handling logic\n\nDriver has a logic leak in ring data allocation/free,\nwhere aq_ring_free could be called multiple times on same ring,\nif system is under stress and got memory allocation error.\n\nRing pointer was used as an indicator of failure, but this is\nnot correct since only ring data is allocated/deallocated.\nRing itself is an array member.\n\nChanging ring allocation functions to return error code directly.\nThis simplifies error handling and eliminates aq_ring_free\non higher layer.\n\ud83d\udccf Published: 2024-05-17T13:45:05.545Z\n\ud83d\udccf Modified: 2025-05-20T14:27:31.461Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/0edb3ae8bfa31cd544b0c195bdec00e036002b5d\n2. https://git.kernel.org/stable/c/c11a870a73a3bc4cc7df6dd877a45b181795fcbf\n3. https://git.kernel.org/stable/c/d1fde4a7e1dcc4d49cce285107a7a43c3030878d\n4. https://git.kernel.org/stable/c/b3cb7a830a24527877b0bc900b9bd74a96aea928", "creation_timestamp": "2025-05-20T14:40:57.000000Z"}, {"uuid": "9ee5339f-b7cb-493d-8c3e-21c4fb9c7d13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5266", "type": "seen", "source": "https://t.me/cibsecurity/71310", "content": "\u203c CVE-2023-5266 \u203c\n\nA vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240879.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-29T18:38:02.000000Z"}]}