{"vulnerability": "CVE-2023-34965", "sightings": [{"uuid": "3f96be1b-28fb-4769-8f57-82e610a1de42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "seen", "source": "https://t.me/GithubRedTeam/4546", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMOVEit CVE-2023-34362\nURL\uff1ahttps://github.com/AgentY0/CVE-2023-34965\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-12T12:50:53.000000Z"}, {"uuid": "9a222715-4bd9-4ea0-96e6-d7daedc1def1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3084", "content": "Tools \ud83d\udd27 \ud83d\udd28- HackersFactory\n\nCVE-2023-34965\n\nSSPanel UIM is a multi-purpose agency service sales management system specially designed for Shadowsocks / V2Ray / Trojan protocols. SSPanel-Uim version before 2023.3 does not restrict access to the /link/ interface,which can lead to a leak of user subscription information.\n\nhttps://github.com/AgentY0/CVE-2023-34965\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bC2-Hunter\n\nReal-time extraction of C2 traffic.\n\nhttps://github.com/ZeroMemoryEx/C2-Hunter\n\n#infosec #pentesting #redteam\n\n\u200b\u200bpeetch\n\nA collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections.\n\nhttps://github.com/quarkslab/peetch\n\n#cybersecurity #infosec #redteam\n\n\u200b\u200bExcel-Exploit \n\nMacroExploit use in excel sheet\n\nhttps://github.com/Mr-Cyb3rgh0st/Excel-Exploit\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-34960\n\nChamilo PoC\n\nhttps://github.com/Aituglo/CVE-2023-34960\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34362\n\nPOC for CVE-2023-34362 affecting MOVEit Transfer.\n\nhttps://github.com/horizon3ai/CVE-2023-34362\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34362\n\nMOVEit Transfer Unauthenticated RCE. For a full technical description of the vulnerability and exploitation, please read our AttackerKB Analysis.\n\nhttps://github.com/sfewer-r7/CVE-2023-34362\n\n#cybersecurity #infosec #cve\n\n\u200b\u200bAwesome Intelligence\n\nA collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources.\n\nhttps://github.com/ARPSyndicate/awesome-intelligence\n\n#OSINT #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-2008\n\nProof of concept exploit for CVE-2023-2008, a bug in the udmabuf driver of the Linux kernel fixed in 5.19-rc4.\n\nhttps://github.com/bluefrostsecurity/CVE-2023-2008\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bKillers\n\nExploitation of process killer drivers.\n\nhttps://github.com/xalicex/Killers\n\n#infosec #pentesting #redteam\n\n\u200b\u200bInveigh\n\nA cross-platform .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers. This repo contains the primary C# version as well as the legacy PowerShell version.\n\nhttps://github.com/Kevin-Robertson/Inveigh\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bRusty Bootkit\n\nWindows UEFI Bootkit in Rust (Codename: RedLotus)\n\nhttps://github.com/memN0ps/bootkit-rs\n\n#infosec #pentesting #redteam\n\n\u200b\u200bSharpFtpC2 (PoC)\n\nA Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.\n\nhttps://github.com/DarkCoderSc/SharpFtpC2\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-15T12:42:57.000000Z"}, {"uuid": "a15de645-23c9-41ba-8655-4b7bec56b0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8479", "content": "#exploit\n1. CVE-2023-34960:\nChamilo PoC\nhttps://github.com/Aituglo/CVE-2023-34960\n\n2. CVE-2023-34965:\nSSPanel UIM not restrict access to the /link/ interface, which can lead to a leak of user subscription information\nhttps://github.com/AgentY0/CVE-2023-34965\n\n3. Excel-Exploit - MacroExploit use in excel sheet\nhttps://github.com/Mr-Cyb3rgh0st/Excel-Exploit", "creation_timestamp": "2023-06-13T11:01:01.000000Z"}, {"uuid": "2dfbed64-992c-42ff-bd35-98df2e157efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "seen", "source": "https://t.me/GithubRedTeam/4545", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMOVEit CVE-2023-34362\nURL\uff1ahttps://github.com/happy0717/CVE-2023-34965\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-12T12:38:06.000000Z"}]}