{"vulnerability": "cve-2023-3086", "sightings": [{"uuid": "b68bb5b2-9c02-41a5-96e4-ebc475fa17dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30869", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/857", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-30869\n\ud83d\udd39 Description: Improper Authentication vulnerability in Easy Digital Downloads plugin allows unauth. Privilege Escalation.\u00a0This issue affects Easy Digital Downloads: from 3.1 through 3.1.1.4.1.\n\ud83d\udccf Published: 2023-05-02T09:46:36.439Z\n\ud83d\udccf Modified: 2025-01-08T22:08:16.581Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/easy-digital-downloads/wordpress-easy-digital-downloads-plugin-3-1-1-4-1-unauthenticated-privilege-escalation-vulnerability?_s_id=cve\n2. https://patchstack.com/articles/critical-easy-digital-downloads-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-08T23:15:45.000000Z"}, {"uuid": "cca6559b-09e3-452b-ba20-3350e6d0db0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30861", "type": "published-proof-of-concept", "source": "Telegram/m4Is75xhrn4Y1biWlK6_QixQuJbhQSfww9UvIBkfxSY20xM", "content": "", "creation_timestamp": "2025-04-25T17:00:08.000000Z"}, {"uuid": "a19df852-d7f5-46ef-bffa-72ef3d74ff1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30861", "type": "seen", "source": "https://t.me/ctinow/180851", "content": "https://ift.tt/2a07Abv\nCVE-2023-30861 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration information disclosure", "creation_timestamp": "2024-02-07T17:42:00.000000Z"}, {"uuid": "3877eb88-254b-42cc-aefc-a6686584929e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3086", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/814", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3086\n\ud83d\udd39 Description: Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.\n\ud83d\udccf Published: 2023-06-03T00:00:00\n\ud83d\udccf Modified: 2025-01-08T19:57:14.018Z\n\ud83d\udd17 References:\n1. https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20\n2. https://github.com/nilsteampassnet/teampass/commit/1c0825b67eb8f8b5ecc418ff7614423a275e6a79", "creation_timestamp": "2025-01-08T20:14:03.000000Z"}, {"uuid": "a6952a98-6a68-4cc5-aa10-47ee8cc54263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30869", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-30869.yaml", "content": "", "creation_timestamp": "2025-11-30T02:15:20.000000Z"}, {"uuid": "ba25cb44-65e7-4a64-9349-f1e6277396f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30869", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m6xda4zjrg2b", "content": "", "creation_timestamp": "2025-12-01T21:02:35.847275Z"}, {"uuid": "100040ef-de8d-4a0c-b40e-13a5019b8194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30861", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5398", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExplaining how to exploit CVE-2023-30861 \nURL\uff1ahttps://github.com/JawadPy/CVE-2023-30861-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-13T08:31:59.000000Z"}, {"uuid": "3b3638b1-67b7-492e-9440-5a87937a140c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30866", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/701", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-30866\n\ud83d\udd39 Description: In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.\n\ud83d\udccf Published: 2023-06-06T05:13:12.727Z\n\ud83d\udccf Modified: 2025-01-08T14:51:41.688Z\n\ud83d\udd17 References:\n1. https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498", "creation_timestamp": "2025-01-08T15:13:58.000000Z"}, {"uuid": "cefbedeb-33c8-4da1-a44c-a40e5cc4af90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30863", "type": "seen", "source": "https://t.me/cibsecurity/65000", "content": "\u203c CVE-2023-30863 \u203c\n\nIn Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-06T12:35:11.000000Z"}, {"uuid": "51698ac4-8ecc-4993-bf87-4035550568e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30860", "type": "seen", "source": "https://t.me/cibsecurity/63455", "content": "\u203c CVE-2023-30860 \u203c\n\nWWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-08T22:37:43.000000Z"}, {"uuid": "acce8e4d-8299-4624-aa7b-c7e86b8ed9ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30869", "type": "seen", "source": "https://t.me/cibsecurity/63149", "content": "\u203c CVE-2023-30869 \u203c\n\nImproper Authentication vulnerability in Easy Digital Downloads plugin allows unauth. Privilege Escalation.\u00c2\u00a0This issue affects Easy Digital Downloads: from 3.1 through 3.1.1.4.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T14:30:06.000000Z"}, {"uuid": "a7a35a1c-98dd-4e00-b796-da82d82392aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30861", "type": "seen", "source": "https://t.me/cibsecurity/63170", "content": "\u203c CVE-2023-30861 \u203c\n\nFlask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.2. The application sets `session.permanent = True`3. The application does not access or modify the session at any point during a request.4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified. This issue has been fixed in versions 2.3.2 and 2.2.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T22:30:23.000000Z"}]}