{"vulnerability": "CVE-2023-5297", "sightings": [{"uuid": "d02eb340-e8ff-4834-a726-c6d91991fc58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52971", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljvzggk4tj2f", "content": "", "creation_timestamp": "2025-03-09T02:45:22.636783Z"}, {"uuid": "6d3101de-2c88-4b62-85ca-daf08cfa3a27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52970", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljvzghckaq2h", "content": "", "creation_timestamp": "2025-03-09T02:45:24.558578Z"}, {"uuid": "985ad4be-bb1a-4478-91ab-760b5cf8b5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-52975", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "7f872786-491d-45e9-99e2-30661aa3140d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52975", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ba9edbff9126c3e314b23b3676098eac", "content": "", "creation_timestamp": "2025-12-04T12:10:06.000000Z"}, {"uuid": "13624055-8c2d-4780-9362-2500983c2f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52975", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m75xqe63di22", "content": "", "creation_timestamp": "2025-12-04T12:25:30.243459Z"}, {"uuid": "d626b561-615e-43c5-a787-760369e1b685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52975", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m75xqgo5fr2z", "content": "", "creation_timestamp": "2025-12-04T12:25:32.543833Z"}, {"uuid": "0e69857e-7a40-4af0-864e-84246a4725a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52975", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwbhky6biw2y", "content": "", "creation_timestamp": "2025-08-13T09:00:04.402980Z"}, {"uuid": "8e4be3db-5848-4f51-a367-74f75b755991", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52971", "type": "seen", "source": "https://t.me/cvedetector/19908", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-52971 - MariaDB Server JOIN Rewrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-52971 \nPublished : March 8, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-09T01:13:27.000000Z"}, {"uuid": "a1b523b2-cce7-4066-a304-95f077b550de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52970", "type": "seen", "source": "https://t.me/cvedetector/19907", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-52970 - MariaDB Server Item Direct View Ref Crash\", \n  \"Content\": \"CVE ID : CVE-2023-52970 \nPublished : March 8, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-09T01:13:26.000000Z"}, {"uuid": "815f5d13-16a6-4d7f-9692-94d42769cace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52970", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6952", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52970\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where.\n\ud83d\udccf Published: 2025-03-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-08T22:52:01.262Z\n\ud83d\udd17 References:\n1. https://jira.mariadb.org/browse/MDEV-32086", "creation_timestamp": "2025-03-08T23:37:03.000000Z"}, {"uuid": "5d5cfe4f-fc20-47b4-bad5-9aff272952ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52971", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6950", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52971\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan.\n\ud83d\udccf Published: 2025-03-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-08T22:54:37.997Z\n\ud83d\udd17 References:\n1. https://jira.mariadb.org/browse/MDEV-32084", "creation_timestamp": "2025-03-08T23:37:02.000000Z"}, {"uuid": "1050946c-5c67-47e2-ac4d-3d6c31432e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52972", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8811", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52972\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Huawei PCs have a vulnerability that allows low-privilege users to bypass SDDL permission checks . Successful exploitation this vulnerability could lead to termination of some system processes.\n\ud83d\udccf Published: 2025-03-26T06:39:03.010Z\n\ud83d\udccf Modified: 2025-03-26T06:39:03.010Z\n\ud83d\udd17 References:\n1. https://www.huawei.com/en/psirt/security-advisories/2025/huawei-sa-20250325-01-pc-en", "creation_timestamp": "2025-03-26T07:25:33.000000Z"}, {"uuid": "ea811f72-dbe5-41ae-a854-415f49a355f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52974", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52974\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress\n\nIf during iscsi_sw_tcp_session_create() iscsi_tcp_r2tpool_alloc() fails,\nuserspace could be accessing the host's ipaddress attr. If we then free the\nsession via iscsi_session_teardown() while userspace is still accessing the\nsession we will hit a use after free bug.\n\nSet the tcp_sw_host-&gt;session after we have completed session creation and\ncan no longer fail.\n\ud83d\udccf Published: 2025-03-27T16:43:13.792Z\n\ud83d\udccf Modified: 2025-03-27T17:08:22.573Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/496af9d3682ed4c28fb734342a09e6cc0c056ea4\n2. https://git.kernel.org/stable/c/6abd4698f4c8a78e7bbfc421205c060c199554a0\n3. https://git.kernel.org/stable/c/d4d765f4761f9e3a2d62992f825aeee593bcb6b9\n4. https://git.kernel.org/stable/c/9758ffe1c07b86aefd7ca8e40d9a461293427ca0\n5. https://git.kernel.org/stable/c/0aaabdb900c7415caa2006ef580322f7eac5f6b6\n6. https://git.kernel.org/stable/c/61e43ebfd243bcbad11be26bd921723027b77441\n7. https://git.kernel.org/stable/c/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3", "creation_timestamp": "2025-03-27T17:26:41.000000Z"}, {"uuid": "33f53b22-2690-4db8-8b7d-41ed5c8845f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52970", "type": "seen", "source": "Telegram/hguAYi3u2wAl_4F-ysBY6UVn0uOry9WnQwpRQd4zhwYCT8AJ", "content": "", "creation_timestamp": "2025-03-09T10:38:05.000000Z"}, {"uuid": "6e8b2bc3-0b8b-48d4-8975-5beea5c81f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52971", "type": "seen", "source": "Telegram/qbfG4Gg_CLW-n_VXgCplQu_Q4NY7FWYfIRQELO1-ncGB2HWE", "content": "", "creation_timestamp": "2025-03-09T10:38:05.000000Z"}, {"uuid": "ce415037-af41-4ad4-930b-37648b43962c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52972", "type": "seen", "source": "https://t.me/cvedetector/21149", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-52972 - Huawei PCs SDDL Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-52972 \nPublished : March 26, 2025, 7:15 a.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : Huawei PCs have a vulnerability that allows low-privilege users to bypass SDDL permission checks . Successful exploitation this vulnerability could lead to termination of some system processes. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T09:42:17.000000Z"}, {"uuid": "5f5a8ef4-a6e7-4f3d-8c2c-7a9a9af49a3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52971", "type": "seen", "source": "Telegram/GwF4-R4LReJDT3x7MgzxuWg8tD7xmRflJk-Kcl2NrhWGXf6D", "content": "", "creation_timestamp": "2025-03-10T14:45:03.000000Z"}]}