{"vulnerability": "CVE-2023-3128", "sightings": [{"uuid": "89fbc410-f6ea-4b76-a156-098634b1dbd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31280", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113687817692170093", "content": "", "creation_timestamp": "2024-12-20T23:47:09.640041Z"}, {"uuid": "83dc3376-2385-49b2-b768-26779d0188c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31280", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldrmpeomgw2o", "content": "", "creation_timestamp": "2024-12-21T00:15:55.902049Z"}, {"uuid": "dd3fe7dd-d106-40d4-911f-7a0012372e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31286", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3681", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31286\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When a password reset request occurs, the server response leaks the existence of users. If one tries to reset a password of a non-existent user, an error message indicates that this user does not exist.\n\ud83d\udccf Published: 2023-04-27T03:30:23Z\n\ud83d\udccf Modified: 2025-01-31T21:35:17Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-31286\n2. https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2\n3. https://github.com/serenity-is/Serenity\n4. https://seclists.org/fulldisclosure/2023/May/14\n5. http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html\n6. http://seclists.org/fulldisclosure/2023/May/14", "creation_timestamp": "2025-01-31T22:16:01.000000Z"}, {"uuid": "6cb005e0-61db-4c94-93da-2ad79c43b32e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31287", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3680", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31287\n\ud83d\udd25 CVSS Score: 7.7 (CVSS_V3)\n\ud83d\udd39 Description: An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.\n\ud83d\udccf Published: 2023-04-27T03:30:23Z\n\ud83d\udccf Modified: 2025-01-31T21:35:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-31287\n2. https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2\n3. https://github.com/serenity-is/Serenity\n4. https://packetstorm.news/files/id/172648\n5. http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html\n6. http://seclists.org/fulldisclosure/2023/May/14", "creation_timestamp": "2025-01-31T22:16:01.000000Z"}, {"uuid": "b06a0e34-6429-4292-892a-4eadef1fdc6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31280", "type": "seen", "source": "https://t.me/cvedetector/13475", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31280 - \"AirVantage Warranty Checker Unauthenticated Bulk IMEI and Serial Number Enumeration\"\", \n  \"Content\": \"CVE ID : CVE-2023-31280 \nPublished : Dec. 21, 2024, 12:15 a.m. | 33\u00a0minutes ago \nDescription : An AirVantage online Warranty Checker tool vulnerability could allow an attacker to   \nperform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial   \nNumber in addition to the warranty status when the Serial Number or IMEI is used to look up   \nwarranty status. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-21T01:57:11.000000Z"}, {"uuid": "62a1ae72-c1d4-4a9b-9f09-903745491be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31280", "type": "seen", "source": "Telegram/0PUHBakNQ0PhSHWgPl49lEiuwsKYc98QFLGUs0bKWeO5wQ-y", "content": "", "creation_timestamp": "2025-01-03T23:46:38.000000Z"}, {"uuid": "d4b979dc-a13b-4bb6-9826-57c9c10bce3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31289", "type": "seen", "source": "https://t.me/ctinow/170088", "content": "https://ift.tt/fznKgAR\nCVE-2023-31289 | Pexip Infinity up to 31.1 Signalling denial of service", "creation_timestamp": "2024-01-19T08:11:48.000000Z"}, {"uuid": "93820674-e8f4-4920-b1f8-44e5b80046ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31284", "type": "seen", "source": "https://t.me/arpsyndicate/357", "content": "#ExploitObserverAlert\n\nCVE-2023-31284\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-31284. illumos illumos-gate before 676abcb has a stack buffer overflow in /dev/net, leading to privilege escalation via a stat on a long file name in /dev/net.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-22T16:36:07.000000Z"}, {"uuid": "912754f8-7084-4f2c-bad7-733f87ecac70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31289", "type": "seen", "source": "https://t.me/ctinow/159147", "content": "https://ift.tt/SN6qdPZ\nCVE-2023-31289", "creation_timestamp": "2023-12-25T07:26:57.000000Z"}, {"uuid": "438b3110-57f4-4db5-b73f-1bd95d707d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3128", "type": "seen", "source": "https://t.me/cibsecurity/65437", "content": "\u203c CVE-2023-3128 \u203c\n\nGrafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-23T00:27:51.000000Z"}, {"uuid": "0ef6a571-3b81-472d-8292-68e7a3b243c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31284", "type": "seen", "source": "https://t.me/cibsecurity/63326", "content": "\u203c CVE-2023-31284 \u203c\n\nillumos illumos-gate before 676abcb has a stack buffer overflow in /dev/net, leading to privilege escalation via a stat on a long file name in /dev/net.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T00:37:15.000000Z"}]}