{"uuid": "8181746c-a97a-4a44-81af-23300f42d857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30347", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3716", "content": "\ud83d\udda5Data Leaks :\n\n\ud83d\udd31Bombardier Recreational Products (brp.com) Leak : https://www.system32.ink/2023/06/bombardier-recreational-products-brpcom.html\n\nf\ud83d\udd31nde_gov_br Database leak :  https://www.system32.ink/2023/06/fndegovbr-database-leak-national-fund.html\n\n\ud83d\udd31Leak Sim\u00f3n Bol\u00edvar Adventist School (casb.edu.co) Database : https://www.system32.ink/2023/06/leak-simon-bolivar-adventist-school.html\n\n\ud83d\udda5Tools: \n\n\ud83d\udd31HCL AppScan Standard v10.2.1  : https://www.system32.ink/2023/06/hcl-appscan-standard-v1021.html\n\n\ud83d\udd31Qualcomm baseband scripts (reverse Engineering) : https://www.system32.ink/2023/06/qualcomm-baseband-scripts.html\n\n\ud83d\udd31The Deepfake Offensive Toolkit : https://www.system32.ink/2023/06/the-deepfake-offensive-toolkit.html\n\n\ud83d\udda5Exploits:\n\n\ud83d\udd31CVE-2023-1454 Jeecg-Boot-qurestSql-SQLvuln Exploit : https://www.system32.ink/2023/06/cve-2023-1454-jeecg-boot-qurestsql.html\n\n\ud83d\udd31CVE-2023-30347 Exploit : Reflected Cross-Site-Scripting in Neox Contact Center : https://www.system32.ink/2023/06/cve-2023-30347-exploit-reflected-cross.html\n\n\ud83d\udda5ScamPages:\n\nJ\ud83d\udd31PMorgan Chase Bank Phishing Page : https://www.system32.ink/2023/06/jpmorgan-chase-bank-phishing-page.html\n\n@crackcodes | crackcodes.in | system32.ink", "creation_timestamp": "2023-06-22T09:44:11.000000Z"}