{"vulnerability": "cve-2023-2859", "sightings": [{"uuid": "9fd92b90-a433-4c51-ade9-f7849646b587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4415", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-2859 Medium Blog\nURL\uff1ahttps://github.com/mnqazi/CVE-2023-2859\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-24T11:12:52.000000Z"}, {"uuid": "540ed61a-f527-4383-95a8-1df70716995b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28597", "type": "seen", "source": "Telegram/FUAKNUMSXfaHiXraL4pta2UjCdSI8Iouq0F--kBp9fdvWeFJ", "content": "", "creation_timestamp": "2025-02-19T19:13:54.000000Z"}, {"uuid": "a6ea75a1-17eb-4a46-9910-484097482776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "Telegram/8xo64kZRtnZUysxfz1-RKPttzMMK3cF0g-OlSKNyj5O3", "content": "", "creation_timestamp": "2024-07-21T20:59:16.000000Z"}, {"uuid": "f858aed6-5901-4fd0-9d40-edfdfe801968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "seen", "source": "https://t.me/cibsecurity/64672", "content": "\u203c CVE-2023-2859 \u203c\n\nCode Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T12:26:46.000000Z"}, {"uuid": "45e4e58a-cd1a-4754-95b4-f5308c04c02e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28597", "type": "seen", "source": "https://t.me/cibsecurity/60830", "content": "\u203c CVE-2023-28597 \u203c\n\nZoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom\u00e2\u20ac\u2122s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T00:38:07.000000Z"}, {"uuid": "a7efa262-8fb9-472a-a504-c069c0837131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3555", "content": "Stored HTML Injection in folderName Affecting Admin in TeamPass &lt;3.0.9 - CVE-2023-2859 (POC)\n\nOne such vulnerability is the Stored HTML Injection in folderName, affecting the administration functionality of TeamPass versions prior to 3.0.9. This vulnerability allows an attacker to inject malicious HTML code into the folderName parameter, leading to potential cross-site scripting (XSS) attacks.\n\nhttps://system32.ink/stored-html-injection-in-foldername-affecting-admin-in-teampass/", "creation_timestamp": "2023-05-25T17:50:58.000000Z"}, {"uuid": "f77d5e30-a464-483d-802c-d4c35f443a21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8362", "content": "#exploit\n1. CVE-2023-2859:\nStored HTML injection in folderName affecting Admin in TeamPass &lt;3.0.9\nhttps://github.com/mnqazi/CVE-2023-2859\n\n2. CVE-2023-20869/CVE-2023-20870:\nVMWare Stack-based Overflow/Uninitialized Variable Info Leak\nhttps://www.zerodayinitiative.com/blog/2023/5/17/cve-2023-2086920870-exploiting-vmware-workstation-at-pwn2own-vancouver\n\n3. CVE-2023-31070:\nBroadcom BCM47xx SDK EMF slab-out-of-bounds write\nhttps://bugprove.com/knowledge-hub/cve-2023-31070-broadcom-bcm-47xx-sdk-emf-slab-out-of-bounds-write", "creation_timestamp": "2023-05-25T12:49:50.000000Z"}, {"uuid": "36b84cb1-081d-4d66-9853-52430a69cd49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "Telegram/0llaq7_vuPppT7OlMPRHT2kNpkSslsGmp9sH3S4q6-AJhw", "content": "", "creation_timestamp": "2023-05-25T17:51:32.000000Z"}, {"uuid": "ba7cae33-4a0c-4f61-9690-843cd23ba4dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3062", "content": "Tools - Hackers Factory \n\nuserefuzz\n\nUser-Agent, X-Forwarded-For and Referer SQLI Fuzzer made with python. Works on linux and unix based systems.\n\nhttps://github.com/root-tanishq/userefuzz\n\n#infosec #pentesting #bugbounty\n\nChrome Cookie Stealer (and injector)\n\nSteal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.\n\nhttps://github.com/magisterquis/chromecookiestealer\n\n#infosec \n\nCVE-2023-2859\n\nStored HTML injection in folderName affecting Admin in TeamPass &lt;3.0.9\n\nhttps://github.com/mnqazi/CVE-2023-2859\n\n#cve #cybersecurity #infosec\n\nWin32 app isolation repo\n\nWin32 app isolation is a new security feature on Windows that helps contain the damage and safeguard user privacy choices in the event of an application compromise. Win32 app isolation is built on the foundation of AppContainers, which offer a security boundary, and components that virtualize resources and provide brokered access to other resources. This repo contains the documentation and tools to help you isolate your applications.\n\nhttps://github.com/microsoft/win32-app-isolation\n\n#cybersecurity #infosec\n\nHunt3r\n\nHunt3r aims to simplify domain recognition by trying to combine three things:\n\n\u2022 Speed of scans\n\u2022 Accuracy of results\n\u2022 Ease of use of the data\n\nhttps://github.com/EasyRecon/Hunt3r\n\n#bugbounty #infosec #pentesting\n\nmonitor_subdomains\n\nMonitor your target continuously for new subdomains using Discord!\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#infosec #pentesting #bugbounty\n\nGitFive\n\n#OSINT tool to investigate GitHub profiles.\n\nhttps://github.com/mxrch/GitFive\n\n#cybersecurity #infosec\n\nROPfuscator\n\nROPfuscator is a fine-grained code obfuscation framework for LLVM-supported languages using ROP (return-oriented programming). ROPfuscator obfuscates a program at the assembly code level by transforming regular instructions into ROP chains, thwarting our natural conception of normal control flow.\n\nhttps://github.com/ropfuscator/ropfuscator\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-25T16:15:06.000000Z"}]}