{"vulnerability": "cve-2023-6397", "sightings": [{"uuid": "dffdf88d-7f04-4ce2-8d21-3b734c49c28a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6397", "type": "seen", "source": "https://t.me/ctinow/188076", "content": "https://ift.tt/CNYVhA5\nCVE-2023-6397", "creation_timestamp": "2024-02-20T03:31:56.000000Z"}, {"uuid": "099e37b6-181b-4397-b97e-2fb6ebdcf09a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6397", "type": "seen", "source": "https://t.me/arpsyndicate/3740", "content": "#ExploitObserverAlert\n\nCVE-2023-6397\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-6397. A null pointer dereference vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1 and USG FLEX series firmware versions from 4.50 through 5.37 Patch 1 could allow a LAN-based attacker to cause denial-of-service (DoS) conditions by downloading a crafted RAR compressed file onto a LAN-side host if the firewall has the \u201cAnti-Malware\u201d feature enabled.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2024-02-21T07:43:34.000000Z"}, {"uuid": "0480e5d6-c216-4af8-b40a-3bc1f16bc021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6397", "type": "seen", "source": "https://t.me/ctinow/188067", "content": "https://ift.tt/CNYVhA5\nCVE-2023-6397", "creation_timestamp": "2024-02-20T03:31:42.000000Z"}]}