{"vulnerability": "CVE-2023-3482", "sightings": [{"uuid": "2ac0d6c5-f91c-4b8d-8bc8-c3de5a314753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-34829\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.\n\ud83d\udccf Published: 2023-12-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T20:32:57.968Z\n\ud83d\udd17 References:\n1. https://github.com/SecureScripts/TP-Link_Tapo_Hack", "creation_timestamp": "2025-04-17T20:58:05.000000Z"}, {"uuid": "74dbd9fc-6e66-470d-85d7-4dfb5f8ef25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "seen", "source": "https://t.me/ctinow/170543", "content": "https://ift.tt/eqbgzcY\nCVE-2023-34829 | TP-Link Tapo prior 3.1.315 access control", "creation_timestamp": "2024-01-20T07:11:58.000000Z"}, {"uuid": "e9618ff7-59f2-4ab4-8712-51ff17fb7e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "seen", "source": "https://t.me/ctinow/163665", "content": "https://ift.tt/5KT3A40\nCVE-2023-34829 Exploit", "creation_timestamp": "2024-01-05T19:17:21.000000Z"}, {"uuid": "e11910e3-86c2-4e8b-ab72-2a7218c10ec4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "seen", "source": "https://t.me/ctinow/159915", "content": "https://ift.tt/qBt8iyf\nCVE-2023-34829", "creation_timestamp": "2023-12-28T04:26:28.000000Z"}, {"uuid": "4b8be265-a6be-465c-ac1d-74e325abf416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3482", "type": "seen", "source": "https://t.me/cibsecurity/65962", "content": "\u203c CVE-2023-3482 \u203c\n\nWhen Firefox is configured to block storage of all cookies, it was still possible to store data in localstorage by using an iframe with a source of 'about:blank'. This could have led to malicious websites storing tracking data without permission. This vulnerability affects Firefox &lt; 115.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-05T14:36:54.000000Z"}]}