{"vulnerability": "CVE-2023-42442", "sightings": [{"uuid": "bb0c8098-d32b-4cce-9d4f-6267f2dcbf39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3213", "content": "Hackers Factory \n\nInstagram-py performs slick brute force attack on Instagram without any type of password limiting\n\nand also resumes your attack in ease.\n\n\u2014DeathSec\n\nhttps://github.com/deathsec/instagram-py\n\nAn open-source self-hosted purple team management web application.\n\nhttps://github.com/CyberCX-STA/PurpleOps?mibextid=Zxz2cZ\n\nJust some lists of Malware Configs\n\nhttps://github.com/Gi7w0rm/MalwareConfigLists\n\na unique vocabulary that is 90% generated with OpenAI ChatGPT.\n\nhttps://github.com/reewardius/bbFuzzing.txt\n\nCVE-2023-20209\n\nhttps://github.com/0x41-Researcher/CVE-2023-20209\n\nOfficial repo for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts\n\nhttps://github.com/sherdencooper/GPTFuzz\n\nAttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&amp;CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details\n\nhttps://github.com/mrwadams/attackgen\n\nA Proof-Of-Concept for the CVE-2023-43770 vulnerability.\n\nhttps://github.com/s3cb0y/CVE-2023-43770-POC\n\nreverse shell using curl\n\nhttps://github.com/irsl/curlshell\n\nCVE-2023-42820\n\nhttps://github.com/h4m5t/CVE-2023-42820\n\nGoCrack is a management frontend for password cracking tools written in Go\n\nhttps://github.com/mandiant/gocrack\n\nAsk a TGS on behalf of another user without password\n\nhttps://github.com/foxlox/GIUDA\n\nCVE-2023-42442\n\nhttps://github.com/HolyGu/CVE-2023-42442\n\nBypass the Event Trace Windows(ETW) and unhook ntdll.\n\nhttps://github.com/unkvolism/Fuck-Etw\n\nMicrosoft SharePoint Server Elevation of Privilege Vulnerability\n\nhttps://github.com/Chocapikk/CVE-2023-29357\n\nDorks-collections-list/onion.txt at main \u00b7 cipher387/Dorks-collections-list\n\nhttps://github.com/cipher387/Dorks-collections-list/blob/main/onion.txt\n\n#infosec #cybersecurity #hackersfactory\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-10-10T20:32:25.000000Z"}, {"uuid": "4220b82d-0c31-44b9-8620-1b10eb05b530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9109", "content": "#exploit\n1. CVE-2023-42442:\nJumpServer unauthorized access vulnerability\nhttps://github.com/HolyGu/CVE-2023-42442\n\n2. CVE-2023-43770:\nRoundcube allows XSS via text/plain e-mail messages\nhttps://github.com/s3cb0y/CVE-2023-43770-POC", "creation_timestamp": "2024-02-03T03:56:47.000000Z"}, {"uuid": "4e479f9e-e343-4578-93a9-ef423cb0f702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1153", "content": "#exploit\n1. CVE-2023-42442:\nJumpServer unauthorized access vulnerability\nhttps://github.com/HolyGu/CVE-2023-42442\n\n2. CVE-2023-43770:\nRoundcube allows XSS via text/plain e-mail messages\nhttps://github.com/s3cb0y/CVE-2023-43770-POC\n\n3. CVE-2023-42820:\nJumpServer - Random seed leakage results in the user password being reset\nhttps://github.com/h4m5t/CVE-2023-42820", "creation_timestamp": "2024-08-16T08:30:20.000000Z"}, {"uuid": "502a5e53-0569-46ac-9652-0450d8245006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5413", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aJumpServer \u5821\u5792\u673a\u7efc\u5408\u6f0f\u6d1e\u5229\u7528, CVE-2023-42442 / CVE-2023-42820\nURL\uff1ahttps://github.com/tarimoe/blackjump\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-14T09:36:21.000000Z"}, {"uuid": "b1e1d298-9d08-4060-bd51-9f8df87af8c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5501", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-42442\nURL\uff1ahttps://github.com/C1ph3rX13/CVE-2023-42442\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-20T08:37:52.000000Z"}, {"uuid": "16c80d9c-e3ee-4d59-a2d0-4db9649b1d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7317", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1a\u6f0f\u6d1e\u5229\u7528\n\u63cf\u8ff0\uff1aJumpServer \u5821\u5792\u673a\u672a\u6388\u6743\u7efc\u5408\u6f0f\u6d1e\u5229\u7528, Exploit for CVE-2023-42442 / CVE-2023-42820 / RCE 2021\nURL\uff1ahttps://github.com/tarihub/blackjump\n\n\u6807\u7b7e\uff1a#\u6f0f\u6d1e\u5229\u7528", "creation_timestamp": "2024-05-16T07:44:30.000000Z"}, {"uuid": "9ebe46cd-9705-46fa-a225-5faa7d9cb396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42442", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lxjl2u6yhk2e", "content": "", "creation_timestamp": "2025-08-29T07:49:10.706127Z"}]}