{"vulnerability": "CVE-2023-3459", "sightings": [{"uuid": "38d1be13-7b74-4554-bd28-5472650fc43e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34598", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4631", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aGibbon\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\uff08CVE-2023-34598\uff09\nURL\uff1ahttps://github.com/Szlein/CVE-2023-34598\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-26T15:22:23.000000Z"}, {"uuid": "9ed4e42f-4da3-473e-8f53-2da8272d015c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34598", "type": "published-proof-of-concept", "source": "https://t.me/kasraone_com/470", "content": "\ud83d\udd34 CVE\n\n      CVE-2023-34598\n\n\n\nGIT HUB :\n https://github.com/Szlein/CVE-2023-34598", "creation_timestamp": "2023-08-18T18:48:38.000000Z"}, {"uuid": "68efe05a-104c-4507-a39f-316ef5bd9a60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34598", "type": "published-proof-of-concept", "source": "Telegram/uz3Ii5rPCysehEa9OU0_DuESJ8cYigCIC8uNS5druarIJng", "content": "", "creation_timestamp": "2025-03-17T16:00:09.000000Z"}, {"uuid": "1b419f51-44a2-40cb-83be-e7325550c419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3459", "type": "seen", "source": "https://t.me/cibsecurity/66881", "content": "\u203c CVE-2023-3459 \u203c\n\nThe Export and Import Users and Customers plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'hf_update_customer' function called via an AJAX action in versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with shop manager-level permissions to change user passwords and potentially take over administrator accounts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:58.000000Z"}, {"uuid": "579a4468-710a-486d-93a7-2550dc2e62a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34598", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3099", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27 \ud83d\udd28  - Hackers Factory \n\n\u200b\u200bosquery-defense-kit\n\nODK (osquery-defense-kit) is unique in that the queries are designed to be used as part of a production detection &amp; response pipeline. The detection queries are formulated to return zero rows during normal expected behavior, so that they may be configured to generate alerts when rows are returned.\n\nhttps://github.com/chainguard-dev/osquery-defense-kit\n\n#cybersecurity #infosec\n\n\u200b\u200bSAFIREFUZZ\n\nA throughput-optimized rehosting and fuzzing framework for ARM Cortex-M firmware. It takes monolithic binary-only firmware images and uses high-level emulation (HLE) and dynamic binary rewriting to run them on far more powerful hardware with low overhead.\n\nhttps://github.com/pr0me/SAFIREFUZZ\n\n#cybersecurity #infosec\n\n\u200b\u200bGoogle CTF\n\nThis repository lists most of the challenges used in the Google CTF since 2017, as well as most of the infrastructure that can be used to run them.\n\nhttps://github.com/google/google-ctf\n\n#CTF #cybersecurity #infosec\n\n\u200b\u200breveng_rtkit\n\nLinux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.\n\nhttps://github.com/reveng007/reveng_rtkit\n\n#infosec #pentesting #redteam\n\n\u200b\u200bPwnDoc-ng\n\nA pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report. \n\nhttps://github.com/pwndoc-ng/pwndoc-ng\n\n#cybersecurity #infosec #pentesting\n\nPwnDoc-Vulns\n\nA collection of vuln templates you can import and use together with PwnDoc or PwnDoc-NG.\n\nhttps://github.com/LuemmelSec/PwnDoc-Vulns\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bVulnx\n\nAn intelligent bot auto shell injector that detects vulnerabilities in multiple types of cms.\n\nhttps://github.com/anouarbensaad/vulnx\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bReview Analyzer\n\nA #Chrome Extension for #extracting valuable insights from reviews, generating concise summaries, sentiment analysis, and keyword extraction.\n\nhttps://github.com/serpapi/review-analyzer\n\n\u200b\u200bCVE-2023-34840\n\nAll versions in angular-ui-notification are vulnerable to XSS due to the library not sanitizing the input provided by the user.\n\nhttps://github.com/Xh4H/CVE-2023-34840\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34598\n\nGibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it's possible to include the content of several files present in the installation folder in the server's response.\n\nhttps://github.com/maddsec/CVE-2023-34598\n\n#cve #cybersecurity #infosec\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-28T15:25:39.000000Z"}, {"uuid": "d195f6d8-e3e4-4cfc-b6af-c010bacff27d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34599", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3093", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bDao-Exploit\n\nCryptanalysis of the DAO exploit &amp; Multi-Stage Attack.\n\nhttps://github.com/demining/Dao-Exploit\n\n#cybersecurity #infosec\n\n\u200b\u200bSLOOTH\n\nSlooth is an advanced vulnerability management system designed to help organizations stay ahead of security threats. By leveraging the Python NVD API wrapper and a REST API, Slooth fetches and organizes data about Common Vulnerabilities and Exposures (CVEs). It provides a unique identifier, the CVE ID, for stakeholders to discuss and research specific vulnerabilities.\n\nhttps://github.com/TheAxumite/SLOOTH-Security-Vulnerability-Search-and-Management\n\n#cve #cybersecurity #infosec\n\n\u200b\u200b\ud83d\udee1 VineShield\n\nObfuscation tool for all executing files and scripts written on python3\n\nhttps://github.com/Nick-Vinesmoke/VineShield\n\n#cybersecurity #infosec\n\n\u200b\u200bX-osint\n\nThis is an #OSINT tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address and more to come in feature updates.\n\nhttps://github.com/TermuxHackz/X-osint\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34835\n\nCross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.\n\nhttps://github.com/sahiloj/CVE-2023-34835\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bThoth\n\nCairo/Starknet security toolkit (bytecode analyzer, disassembler, decompiler, symbolic execution, SBMC)\n\nhttps://github.com/FuzzingLabs/thoth\n\n#cybersecurity #infosec\n\n\u200b\u200bPROFILEGPT\n\nA tool for analyzing profiles and hashtags on Twitter. The application exploits various technologies and APIs to collect data and generate information for users.\n\nhttps://github.com/odiks/PROFILEGPT\n\n#OSINT #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34599\n\nMultiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.\n\nhttps://github.com/maddsec/CVE-2023-34599\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bDaProfiler\n\n#OSINT tool allowing you to collect certain information about yourself in order to rectify by rgpd requests the traces you may have left on the net. DaProfiler is indeed able to recover: Addresses, Social media accounts, e-mail addresses, mobile / landline number, jobs. On a specified subject in a limited time. \n\nhttps://github.com/daprofiler/DaProfiler\n\n#cybersecurity #infosec\n\n\u200b\u200bJormungandr \n\nA kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.\n\nhttps://github.com/Idov31/Jormungandr\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-26T23:00:10.000000Z"}, {"uuid": "f3e6e370-9a88-4ca0-9476-0ab84f363f6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34599", "type": "published-proof-of-concept", "source": "Telegram/UPOEOvXabxzuXPkJBAtH1OWP71MuzCeSWEouGFgNI1I0gw", "content": "", "creation_timestamp": "2023-06-24T16:36:58.000000Z"}, {"uuid": "40ae6d47-3394-4f68-af79-deffcc78f215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34599", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3726", "content": "\ud83d\udda5Instagram DOS Exploit: \n\n\ud83d\udd31Instagram App 287.0.0.22.85 - Denial of Service : https://www.system32.ink/2023/06/exploit-instagram-app-287002285-denial.html\n\n\ud83d\udda5Dataleaks:\n\n\ud83d\udd31Leland Campbell LLP Leak : https://www.system32.ink/2023/06/leland-campbell-llp-leak.html\n\n\ud83d\udd31Ulyanovsk Instrumentation and Repair Plant (uprz.ru) Data Leak : https://www.system32.ink/2023/06/ulyanovsk-instrumentation-and-repair.html\n\n\ud83d\udd31Yayasan Tifa (Tifa Foundation tifafoundation.id) Data Leak : https://www.system32.ink/2023/06/yayasan-tifa-tifa-foundation.html\n\n\ud83d\udd31National Institute of Cardiovascular Diseases, Bangladesh Data Leak : https://www.system32.ink/2023/06/national-institute-of-cardiovascular.html\n\n\ud83d\udd31{azadijobs_com} Bangladesh AzadiJob Company Data Leak : https://www.system32.ink/2023/06/azadijobscom-bangladesh-azadijob.html\n\n\ud83d\udda5Exploit &amp; POC:\n\n\ud83d\udd31CVE-2023-35840 elFinder &lt; 2.1.62 - Path Traversal vulnerability POC : https://www.system32.ink/2023/06/cve-2023-35840-elfinder-2162-path.html\n\n\ud83d\udd31CVE-2023-34599 POC - Multiple Cross-Site Scripting (XSS) in Gibbon v25.0.0 : https://www.system32.ink/2023/06/cve-2023-34599-poc-multiple-cross-site.html\n\n\ud83d\udda5Tools:\n\n\ud83d\udd31NimExec - Fileless Command Execution for Lateral Movement in Nim : https://www.system32.ink/2023/06/nimexec-fileless-command-execution-for.html\n\n\ud83d\udd31PrimusC2 - A C2 framework : https://www.system32.ink/2023/06/primusc2-c2-framework.html\n\n\ud83d\udda5Rat:\n\n\ud83d\udd31S500 Rat : https://www.system32.ink/2023/06/s500-rat-crack.html\n\n@crackcodes | crackcodes.in | system32.ink", "creation_timestamp": "2023-06-24T16:36:08.000000Z"}, {"uuid": "54549073-d151-4b7d-956e-9ff16ad171a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34599", "type": "seen", "source": "https://t.me/cibsecurity/65727", "content": "\u203c CVE-2023-34599 \u203c\n\nMultiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:35.000000Z"}, {"uuid": "a9a34803-2dda-49bb-a9ab-14cbb648c439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34598", "type": "seen", "source": "https://t.me/cibsecurity/65717", "content": "\u203c CVE-2023-34598 \u203c\n\nGibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:22.000000Z"}, {"uuid": "62615ccf-f039-497a-8180-3844b38f9007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34599", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8546", "content": "#exploit\n1. CVE-2023-34599:\nMultiple XSS vulnerabilities in Gibbon v25.0\nhttps://github.com/maddsec/CVE-2023-34599\n\n2. Cryptanalysis of the DAO exploit &amp; Multi-Stage Attack\nhttps://github.com/demining/Dao-Exploit\n\n3. CVE-2022-31696:\nVMWare ESXI TCP Socket Keepalive Type Confusion LPE\nhttps://www.zerodayinitiative.com/blog/2023/6/21/cve-2022-31696-an-analysis-of-a-vmware-esxi-tcp-socket-keepalive-type-confusion-lpe", "creation_timestamp": "2023-06-24T20:40:48.000000Z"}]}