{"vulnerability": "CVE-2023-4813", "sightings": [{"uuid": "5f21dfb2-2050-47f6-8710-6bc41f88248b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48132", "type": "seen", "source": "https://t.me/ctinow/187517", "content": "https://ift.tt/9dmLj6P\nCVE-2023-48132 | kosei entertainment esportsstudioLegends mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-19T08:56:26.000000Z"}, {"uuid": "3f2a2bb4-623f-40f3-ba24-ff1907aa2033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4813", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14151", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-4813\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.\n\ud83d\udccf Published: 2023-09-12T21:54:33.387Z\n\ud83d\udccf Modified: 2025-04-30T19:58:08.516Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHBA-2024:2413\n2. https://access.redhat.com/errata/RHSA-2023:5453\n3. https://access.redhat.com/errata/RHSA-2023:5455\n4. https://access.redhat.com/errata/RHSA-2023:7409\n5. https://access.redhat.com/security/cve/CVE-2023-4813\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2237798", "creation_timestamp": "2025-04-30T20:14:27.000000Z"}, {"uuid": "4e138bac-0fc4-4229-944c-b12471aec247", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48133", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18492", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48133\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in angel coffee mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.\n\ud83d\udccf Published: 2024-01-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-16T18:19:18.573Z\n\ud83d\udd17 References:\n1. https://github.com/syz913/CVE-reports/blob/main/angel%20coffee.md", "creation_timestamp": "2025-06-16T18:38:40.000000Z"}, {"uuid": "a9f7a7c7-dfc7-4ad6-a29d-a6112230a55c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48133", "type": "seen", "source": "https://t.me/ctinow/187516", "content": "https://ift.tt/f2Ui6TE\nCVE-2023-48133 | angel coffee mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-19T08:56:24.000000Z"}, {"uuid": "42110986-3bb1-497f-979d-659833a6ab8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48130", "type": "seen", "source": "https://t.me/ctinow/187515", "content": "https://ift.tt/O5GfBhq\nCVE-2023-48130 | GINZA CAFE mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-19T08:56:23.000000Z"}, {"uuid": "1f02e1d1-9828-4ad2-8577-524016c4ba68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48131", "type": "seen", "source": "https://t.me/ctinow/176141", "content": "https://ift.tt/OEmyaj4\nCVE-2023-48131 Exploit", "creation_timestamp": "2024-01-30T18:17:05.000000Z"}, {"uuid": "4eb21905-1d55-4a6a-b097-f5991814398c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48131", "type": "seen", "source": "https://t.me/ctinow/187511", "content": "https://ift.tt/c0u5Y2n\nCVE-2023-48131 | CHIGASAKI BAKERY mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-19T08:56:19.000000Z"}, {"uuid": "314e221d-0792-49e1-971b-a456020e411a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48135", "type": "seen", "source": "https://t.me/ctinow/187506", "content": "https://ift.tt/QqBvalf\nCVE-2023-48135 | mimasaka_farm mini-app on Line 13.6.1 Channel Access Token information disclosure", "creation_timestamp": "2024-02-19T08:26:53.000000Z"}, {"uuid": "c518f9ac-5591-4f56-a852-1de7c1698ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48133", "type": "seen", "source": "https://t.me/ctinow/176147", "content": "https://ift.tt/sM54hwb\nCVE-2023-48133 Exploit", "creation_timestamp": "2024-01-30T18:17:13.000000Z"}, {"uuid": "0a0d0d8d-ae13-476f-a55c-5ae493569bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48135", "type": "seen", "source": "https://t.me/ctinow/176146", "content": "https://ift.tt/0BPEVD5\nCVE-2023-48135 Exploit", "creation_timestamp": "2024-01-30T18:17:11.000000Z"}, {"uuid": "9e5ebc14-ca4a-431c-872d-6a390ca42147", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48132", "type": "seen", "source": "https://t.me/ctinow/176140", "content": "https://ift.tt/BHAY391\nCVE-2023-48132 Exploit", "creation_timestamp": "2024-01-30T18:17:03.000000Z"}, {"uuid": "d8524d4f-0839-4920-8df9-c4b95788843c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48130", "type": "seen", "source": "https://t.me/ctinow/176142", "content": "https://ift.tt/jcO3DT1\nCVE-2023-48130 Exploit", "creation_timestamp": "2024-01-30T18:17:06.000000Z"}, {"uuid": "b69e4504-627f-4daa-8500-46ea5db291ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48135", "type": "seen", "source": "https://t.me/ctinow/174042", "content": "https://ift.tt/NuLmdtb\nCVE-2023-48135", "creation_timestamp": "2024-01-26T08:31:24.000000Z"}, {"uuid": "affd56f6-80cb-4577-81ab-27d678c98bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48133", "type": "seen", "source": "https://t.me/ctinow/174041", "content": "https://ift.tt/s2fb1oD\nCVE-2023-48133", "creation_timestamp": "2024-01-26T08:31:23.000000Z"}, {"uuid": "c58c8006-ef8f-44d9-854a-f2df9f29d0d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48132", "type": "seen", "source": "https://t.me/ctinow/174040", "content": "https://ift.tt/PqZWvS5\nCVE-2023-48132", "creation_timestamp": "2024-01-26T08:31:22.000000Z"}, {"uuid": "7712b62b-8a8a-4acb-b915-996cfbfa2fc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48131", "type": "seen", "source": "https://t.me/ctinow/174039", "content": "https://ift.tt/sCcgo7A\nCVE-2023-48131", "creation_timestamp": "2024-01-26T08:31:21.000000Z"}, {"uuid": "ce96c94a-df69-4676-9fe0-2aaf0b01c71c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48130", "type": "seen", "source": "https://t.me/ctinow/174038", "content": "https://ift.tt/f3EnKok\nCVE-2023-48130", "creation_timestamp": "2024-01-26T08:31:20.000000Z"}, {"uuid": "c1da96a6-d863-4562-b09b-c9be0ce68e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4813", "type": "seen", "source": "https://t.me/cibsecurity/70364", "content": "\u203c CVE-2023-4813 \u203c\n\nA flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-14T20:56:49.000000Z"}]}