{"vulnerability": "CVE-2023-34634", "sightings": [{"uuid": "e370a70f-b1d9-434a-b0e4-4d5a50237d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "https://bsky.app/profile/zetainfosec.tech/post/3ledj2nceq62h", "content": "", "creation_timestamp": "2024-12-28T02:58:33.858374Z"}, {"uuid": "f50478f2-7459-40aa-ac3a-3643184b3e31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "42d5e56a-c22f-4def-9c02-b859e1b26c37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "https://bsky.app/profile/deskmodder.de/post/3lu2z4gpqag26", "content": "", "creation_timestamp": "2025-07-16T08:35:06.142773Z"}, {"uuid": "917e9fa7-1048-4cbe-aa29-c85dc78b7261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/greenshot_deserialize_cve_2023_34634.rb", "content": "", "creation_timestamp": "2023-08-17T14:46:50.000000Z"}, {"uuid": "60638f58-6a18-41a3-940b-b58b1d2f7c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "https://t.me/cibsecurity/67517", "content": "\u203c CVE-2023-34634 \u203c\n\nGreenshot 1.2.10 and below allows arbitrary code execution because .NET content is insecurely deserialized when a .greenshot file is opened.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-01T22:58:33.000000Z"}, {"uuid": "cca7672e-2b5f-4a3b-a41b-7046aec0d51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:55.000000Z"}, {"uuid": "52ef146c-8803-4b3e-ab59-36f62e8774e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "cb1801be-b75f-49c7-be94-b0910b71f3ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4943", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPython rewrite of the POC for CVE-2023-34634\nURL\uff1ahttps://github.com/radman404/CVE-2023-34634\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-18T09:13:05.000000Z"}, {"uuid": "a2721826-196d-4dcb-b211-27f455dde552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34634", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8883", "content": "#exploit\n1. CVE-2023-20073:\nCisco RV340/RV340W/RV345/RV345P VPN Routers Arbitrary File Upload\nhttps://github.com/RegularITCat/CVE-2023-20073\n\n2. CVE-2023-3836:\nArbitrary File Upload/Upload Webshell\nhttps://github.com/codeb0ss/CVE-2023-3836\n\n3. CVE-2023-34634:\nGreenshot &lt;=1.2.10 - arbitrary code execution because .NET content is insecurely deserialized when a .greenshot file is opened\nhttps://github.com/radman404/CVE-2023-34634", "creation_timestamp": "2023-08-20T20:43:57.000000Z"}]}