{"vulnerability": "CVE-2023-3914", "sightings": [{"uuid": "b9f18f87-4874-464d-add0-7395919e1517", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39147", "type": "exploited", "source": "https://www.exploit-db.com/exploits/51639", "content": "", "creation_timestamp": "2023-07-31T00:00:00.000000Z"}, {"uuid": "9f3b2197-42d0-4f52-b1ee-6023faadc9e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/ctinow/128767", "content": "https://ift.tt/fQuIveM\nPaperCut fixes bug that can lead to RCE, patch quickly! (CVE-2023-39143)", "creation_timestamp": "2023-08-07T13:31:48.000000Z"}, {"uuid": "51dd67ad-c5d6-440a-bbe0-6ebe27d93a67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "seen", "source": "https://gist.github.com/PrinceGeorge00/94c56fe91743e53191dc781e31ccc475", "content": "", "creation_timestamp": "2025-06-21T10:27:10.000000Z"}, {"uuid": "bbbece57-dbc0-4237-b8ec-f8c56b032e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4937", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-39143 &lt; PaperCut &lt; Path Traversal (PT)\nURL\uff1ahttps://github.com/codeb0ss/CVE-2023-39143\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-17T03:04:36.000000Z"}, {"uuid": "bd4b8008-1f02-4f8c-8f87-e345f3d42256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lvkz4tzx4k2t", "content": "", "creation_timestamp": "2025-08-04T10:43:07.786843Z"}, {"uuid": "293a5af9-d06c-4a87-9eaa-441c9f7d1e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lvkz4xobrk2t", "content": "", "creation_timestamp": "2025-08-04T10:43:08.544478Z"}, {"uuid": "e57dc156-c310-40e9-8fa3-f409f07a795e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lvmnvts2kk2n", "content": "", "creation_timestamp": "2025-08-05T02:27:36.953250Z"}, {"uuid": "5cfaf1ed-7122-40b2-ac2c-945032ad3f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3iopguxmf2j", "content": "", "creation_timestamp": "2025-10-18T21:02:27.051441Z"}, {"uuid": "c3ca218c-56b7-4afc-8aed-254070e3dbe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5034", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMass Exploit - CVE-2023-39141 &lt; Aria2 WebUI &lt; Path traversal\nURL\uff1ahttps://github.com/codeb0ss/CVE-2023-39141-PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-30T02:38:36.000000Z"}, {"uuid": "42655ee2-3e8d-44a1-8143-d0cdad02f04c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/ctinow/128515", "content": "https://ift.tt/FHgoKva\nCVE-2023-39143: PaperCut Path Traversal/File Upload RCE Vulnerability", "creation_timestamp": "2023-08-04T18:56:12.000000Z"}, {"uuid": "4d6c7809-9bc5-4812-818b-7a4ca84a3b2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "Telegram/iGW_5A0oZkZcyB-GkqlrOVgdjCeQTucngSvvwjWlsOYRomA", "content": "", "creation_timestamp": "2024-03-30T17:23:45.000000Z"}, {"uuid": "f3953e1b-b605-4c8c-b134-06ba3070a961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/breachdetector/349748", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"CVE-2023-39143 PaperCut Dosya Y\u00fckleme RCE G\u00fcvenlik A\u00e7\u0131\u011f\u0131 Nedir ?\", \n  \"author\": \" ('BARBAROS)\",\n  \"Detection Date\": \"01 Oct 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-10-01T11:46:19.000000Z"}, {"uuid": "5607fecc-8c38-4356-be21-971cfca81e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "Telegram/K8DqN0S8j6t7D_4s_jk4EYHMzPuZC-_gZUBpA-z_wpVtbw", "content": "", "creation_timestamp": "2023-08-05T06:30:17.000000Z"}, {"uuid": "084ad9e4-3b08-44cb-b373-6fc339443d3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "published-proof-of-concept", "source": "Telegram/NpG85aq7tLrhk2BRDw3d-JYvHHf0NJAv_t6hPSlAsFpVKhc", "content": "", "creation_timestamp": "2025-04-10T05:00:10.000000Z"}, {"uuid": "9fee5601-8835-4bfc-b314-8e6a5c5bb146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "published-proof-of-concept", "source": "Telegram/FAIvuvhej6YKUILw0E0XScyFxRjU5GWS0y-TO9Z9-0AOFS8", "content": "", "creation_timestamp": "2025-04-09T17:00:10.000000Z"}, {"uuid": "7a5c1b5a-e2dc-4905-91b1-47357061422a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/KomunitiSiber/604", "content": "Researchers Uncover New High-Severity Vulnerability in PaperCut Software\nhttps://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html\n\nCybersecurity researchers have discovered a new high-severity security flaw in PaperCut print management software for Windows that could result in remote code execution under specific circumstances.\nTracked as\u00a0CVE-2023-39143\u00a0(CVSS score: 8.4), the flaw impacts PaperCut NG/MF prior to version 22.1.3. It has been described as a combination of a path traversal and file upload vulnerability.\n\"", "creation_timestamp": "2023-08-05T07:26:19.000000Z"}, {"uuid": "832c5c26-e0df-4a52-ba25-4988c2babd36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1088", "content": "", "creation_timestamp": "2024-09-17T21:30:02.000000Z"}, {"uuid": "f252c83f-5471-4216-9d27-c762f6851d83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "Telegram/AffLbZ0Sz3KAhFQ1Y2CnWcGmlKJWr9ckp0m49CPJqCIDd2I", "content": "", "creation_timestamp": "2023-12-25T13:50:51.000000Z"}, {"uuid": "7597a0e2-3134-4c9c-af5a-59f63fd9d75f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/true_secator/4702", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Horizon3 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043d\u043e\u0432\u0443\u044e RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0435\u0447\u0430\u0442\u044c\u044e PaperCut MF/NG.\n\nCVE-2023-39143 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u0437\u0430\u043f\u0438\u0441\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c RCE \u0432 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u0445 \n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u044b PaperCut, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows \u0438 \u0438\u043c\u0435\u044e\u0449\u0438\u0435 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u0443\u044e \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0443 \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u0438 \u0441 \u0432\u043d\u0435\u0448\u043d\u0438\u043c\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c\u0438.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u044d\u0442\u043e\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445 \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 PaperCut NG \u0438\u043b\u0438 PaperCut MF.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Horizon3, \u043f\u043e\u0434\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u044b.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u043d\u043e\u0432\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u044e\u0442\u0441\u044f, \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445  \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0439.\n\nPaperCut \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430\u00a0\u043f\u0430\u0442\u0447\u00a0\u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0432\u0435\u0440\u0441\u0438\u0438 22.1.3, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0438 \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f. \u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043e\u043f\u0438\u0441\u0430\u043b CVE-2023-39143 \u043a\u0430\u043a \u0434\u0432\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u043f\u0443\u0442\u0438 \u0438 \u043e\u0442\u043c\u0435\u0442\u0438\u043b, \u0447\u0442\u043e \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u044f\u043c\u043e\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a IP-\u0430\u0434\u0440\u0435\u0441\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\n\u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043d\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e CVE-2023-39143 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0443\u043f\u043e\u0432\u0430\u0442\u044c \u043d\u0430 \u044d\u0442\u043e \u043d\u0435 \u0441\u0442\u043e\u0438\u0442, \u0432\u0435\u0434\u044c \u0434\u0440\u0443\u0433\u0430\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c PaperCut, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2023-27350,  \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 ransomware \u0438 \u0410\u0420\u0422.", "creation_timestamp": "2023-08-08T14:56:41.000000Z"}, {"uuid": "bca20b80-7a12-4c54-8d12-680406472ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1039", "content": "CVE-2023-39143 &lt; PaperCut &lt; Path Traversal (PT)", "creation_timestamp": "2024-09-17T21:31:17.000000Z"}, {"uuid": "d82552bb-e364-4399-b88a-725c716db4fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1041", "content": "CVE-2023-39143: \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc PaperCut Path Traversal/File Upload RCE\nPOC: https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/\nPOC: https://github.com/codeb0ss/CVE-2023-39143 (\u0647\u0634\u062f\u0627\u0631: \u062a\u0633\u062a \u0646\u0634\u062f\u0647)\n\nCVE-2023-39143: PaperCut Path Traversal/File Upload RCE Vulnerability\nPOC : https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/\nPOC : https://github.com/codeb0ss/CVE-2023-39143 (warning : not tested)", "creation_timestamp": "2024-04-29T12:49:01.000000Z"}, {"uuid": "5ded97d8-2be9-4822-b9de-290e86af8824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/ctinow/167426", "content": "https://ift.tt/WtzLvrp\nWriteup for CVE-2023-39143: PaperCut WebDAV Vulnerability", "creation_timestamp": "2024-01-12T18:46:44.000000Z"}, {"uuid": "a021ee18-59e6-4437-b9f4-38d7ccbf7b92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3914", "type": "seen", "source": "https://t.me/cibsecurity/71258", "content": "\u203c CVE-2023-3914 \u203c\n\nA business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-29T12:37:36.000000Z"}, {"uuid": "e7501c8e-a6a0-4a7c-be82-0bfcd0cac9b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/cibsecurity/67766", "content": "\u203c CVE-2023-39143 \u203c\n\nPaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T16:18:31.000000Z"}, {"uuid": "762993c2-fecb-4680-999e-e808b3762588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "seen", "source": "https://t.me/cibsecurity/68965", "content": "\u203c CVE-2023-39141 \u203c\n\nwebui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-22T22:18:09.000000Z"}, {"uuid": "afcfd302-17fb-44c1-8238-ea4789f52a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2212", "content": "https://www.horizon3.ai/writeup-for-cve-2023-39143-papercut-webdav-vulnerability\n\nCVE-2023-39143\n#\u5206\u6790", "creation_timestamp": "2024-03-30T05:59:53.000000Z"}, {"uuid": "428e3f75-626d-4d2e-a1a4-b7e3ea3a8730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "seen", "source": "https://t.me/thehackernews/3698", "content": "\u26a0\ufe0f ALERT: High-severity security flaw in PaperCut print management software for Windows! \n \nCVE-2023-39143 enables remote code execution. Update to version 22.1.3 for protection! \n \nLearn more about this: https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html", "creation_timestamp": "2023-08-05T06:16:36.000000Z"}, {"uuid": "9d9009b1-4756-445a-977a-8e441c4829c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8227", "content": "Writeup for CVE-2023-39143: PaperCut WebDAV Vulnerability \u2013 Horizon3.ai\n\nhttps://www.horizon3.ai/writeup-for-cve-2023-39143-papercut-webdav-vulnerability/", "creation_timestamp": "2024-01-13T17:54:58.000000Z"}, {"uuid": "6ad6454b-f91a-402c-a8c9-6ef0fca5cf82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39147", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/810", "content": "cve-2023-39147\n\npython3 51639.py -u \"http://$ip:8000/\" -c \"whoami\"", "creation_timestamp": "2023-08-03T16:21:52.000000Z"}, {"uuid": "d0228044-2c80-4b1d-8fe0-63027217c8b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39147", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8780", "content": "#exploit\n1. CVE-2023-37979:\nXSS in Ninja Forms wordpress plugin\nhttps://github.com/Fire-Null/CVE-2023-37979\n]-&gt; https://github.com/Mehran-Seifalinia/CVE-2023-37979\n\n2. CVE-2023-39147:\nUvdesk v1.1.3 - File Upload RCE (Authenticated)\nhttps://www.exploit-db.com/exploits/51639", "creation_timestamp": "2023-08-02T13:18:29.000000Z"}, {"uuid": "00cc46b1-e03c-4c9e-8237-037d562a351c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39143", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10241", "content": "#exploit\n1. Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques\nhttps://pwning.tech/nftables\n\n2. CVE-2023-39143:\nPaperCut WebDAV Vulnerability\nhttps://www.horizon3.ai/writeup-for-cve-2023-39143-papercut-webdav-vulnerability", "creation_timestamp": "2024-03-30T12:12:01.000000Z"}, {"uuid": "dad94db8-bf61-440a-a35c-f71e0f9d5340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39141", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8944", "content": "#exploit\n1. CVE-2023-39141:\nAria2 WebUI - Path traversal\nhttps://github.com/codeb0ss/CVE-2023-39141-PoC\n\n2. CVE-2023-34040:\nSpring Kafka Deserialization Vulnerability\nhttps://github.com/Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040\n\n3. CVE-2023-26818:\nExploit MacOS TCC Bypass W/ Telegram\nhttps://github.com/Zeyad-Azima/CVE-2023-26818", "creation_timestamp": "2023-08-31T10:59:01.000000Z"}]}