{"vulnerability": "CVE-2023-4280", "sightings": [{"uuid": "1e8ab2f6-b7c5-4423-93a8-349d888bb789", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4280", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18332", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-4280\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.\n\ud83d\udccf Published: 2024-01-02T16:52:06.959Z\n\ud83d\udccf Modified: 2025-06-13T19:03:26.975Z\n\ud83d\udd17 References:\n1. https://github.com/SiliconLabs/gecko_sdk\n2. https://community.silabs.com/069Vm0000004NinIAE", "creation_timestamp": "2025-06-13T19:35:03.000000Z"}, {"uuid": "3cbb43b4-ad6a-472c-8e25-7e7ab439217b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42804", "type": "seen", "source": "https://t.me/cibsecurity/73173", "content": "\u203c CVE-2023-42804 \u203c\n\nBigBlueButton is an open-source virtual classroom. BigBlueButton prior to version 2.6.0-beta.1 has a path traversal vulnerability that allows an attacker with a valid starting folder path, to traverse and read other files without authentication, assuming the files have certain extensions (txt, swf, svg, png). In version 2.6.0-beta.1, input validation was added on the parameters being passed and dangerous characters are stripped. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-30T21:19:53.000000Z"}, {"uuid": "6ec998f1-0283-4d44-bd07-45e3f67c6b31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42808", "type": "seen", "source": "https://t.me/cibsecurity/71634", "content": "\u203c CVE-2023-42808 \u203c\n\nCommon Voice is the web app for Mozilla Common Voice, a platform for collecting speech donations in order to create public domain datasets for training voice recognition-related tools. Version 1.88.2 is vulnerable to reflected Cross-Site Scripting given that user-controlled data flows to a path expression (path of a network request). This issue may lead to reflected Cross-Site Scripting (XSS) in the context of Common Voice\u00e2\u20ac\u2122s server origin. As of time of publication, it is unknown whether any patches or workarounds exist.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-05T00:13:28.000000Z"}, {"uuid": "772e8ff1-332e-4655-94ba-766e58326010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4280", "type": "seen", "source": "https://t.me/cibsecurity/74185", "content": "\u203c\ufe0fCVE-2023-4280\u203c\ufe0f\n\nAn unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:35:59.000000Z"}, {"uuid": "59a1670b-cee4-495b-b8be-ffec8e0f4544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42800", "type": "seen", "source": "https://t.me/ctinow/157952", "content": "https://ift.tt/yzkB6Kl\nCVE-2023-42800 Exploit", "creation_timestamp": "2023-12-21T21:16:37.000000Z"}, {"uuid": "70d179a7-b01b-4c02-8c28-123d617a87f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42809", "type": "seen", "source": "https://t.me/cibsecurity/71639", "content": "\u203c CVE-2023-42809 \u203c\n\nRedisson is a Java Redis client that uses the Netty framework. Prior to version 3.22.0, some of the messages received from the Redis server contain Java objects that the client deserializes without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running in. Version 3.22.0 contains a patch for this issue.Some post-fix advice is available. Do NOT use `Kryo5Codec` as deserialization codec, as it is still vulnerable to arbitrary object deserialization due to the `setRegistrationRequired(false)` call. On the contrary, `KryoCodec` is safe to use. The fix applied to `SerializationCodec` only consists of adding an optional allowlist of class names, even though making this behavior the default is recommended. When instantiating `SerializationCodec` please use the `SerializationCodec(ClassLoader classLoader, Set allowedClasses)` constructor to restrict the allowed classes for deserialization.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-05T00:13:34.000000Z"}, {"uuid": "f0a8fe59-12c1-4875-abb8-153bda1d1e70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4280", "type": "seen", "source": "https://t.me/ctinow/161943", "content": "https://ift.tt/Sn2Zyxt\nCVE-2023-4280", "creation_timestamp": "2024-01-02T18:26:57.000000Z"}, {"uuid": "d911a1ed-d5d7-475e-a9f7-c9ab7a729ed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4280", "type": "seen", "source": "https://t.me/ctinow/171754", "content": "https://ift.tt/zdj7fHM\nCVE-2023-4280 | Silabs Gecko SDK up to 4.3.x TrustZone out-of-bounds write", "creation_timestamp": "2024-01-23T07:52:00.000000Z"}, {"uuid": "9282e8f4-73b1-4eca-b3d8-aa5810cb53fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42801", "type": "seen", "source": "https://t.me/ctinow/159814", "content": "https://ift.tt/6I1a780\nCVE-2023-42801 Exploit", "creation_timestamp": "2023-12-27T23:17:10.000000Z"}, {"uuid": "48accae8-e043-4913-828d-e213ddd348ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42807", "type": "seen", "source": "https://t.me/cibsecurity/70911", "content": "\u203c CVE-2023-42807 \u203c\n\nFrappe LMS is an open source learning management system. In versions 1.0.0 and prior, on the People Page of LMS, there was an SQL Injection vulnerability. The issue has been fixed in the `main` branch. Users won't face this issue if they are using the latest main branch of the app.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-21T20:31:08.000000Z"}, {"uuid": "3156e367-834f-49ae-b993-b7a95ee93139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42806", "type": "seen", "source": "https://t.me/cibsecurity/70909", "content": "\u203c CVE-2023-42806 \u203c\n\nHydra is the layer-two scalability solution for Cardano. Prior to version 0.13.0, not signing and verifying `$\\mathsf{cid}$` allows an attacker (which must be a participant of this head) to use a snapshot from an old head instance with the same participants to close the head or contest the state with it. This can lead to an incorrect distribution of value (= value extraction attack; hard, but possible) or prevent the head to finalize because the value available is not consistent with the closed utxo state (= denial of service; easy). A patch is planned for version 0.13.0. As a workaround, rotate keys between heads so not to re-use keys and not result in the same multi-signature participants.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-21T20:31:06.000000Z"}, {"uuid": "195e11db-2125-44f2-a5ee-18596599fef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42805", "type": "seen", "source": "https://t.me/cibsecurity/70908", "content": "\u203c CVE-2023-42805 \u203c\n\nquinn-proto is a state machine for the QUIC transport protocol. Prior to versions 0.9.5 and 0.10.5, receiving unknown QUIC frames in a QUIC packet could result in a panic. The problem has been fixed in 0.9.5 and 0.10.5 maintenance releases.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-21T20:31:05.000000Z"}]}