{"vulnerability": "cve-2023-31099", "sightings": [{"uuid": "fd44ff54-74b2-4eb7-a9a4-483d2116f2a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31099", "type": "published-proof-of-concept", "source": "Telegram/2ll6hh1bRVrEFfGLVvmcXFGa-ma2XRt9Qhxg0JMZZaj3Ow", "content": "", "creation_timestamp": "2024-01-25T17:54:00.000000Z"}, {"uuid": "02320b27-01ca-40be-9d73-21441db5ca72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31099", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9734", "content": "#exploit\n1. CVE-2023-31099:\nZoho ManageEngine Opmanager deserialization RCE\nhttps://xz.aliyun.com/t/13216\n\n2. PoC for webauthn/passkeyss\nhttps://github.com/spbkaizo/go-demo-passkeys\n\n3. Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability\nhttps://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability\n]-&gt; PoC: https://github.com/star-sg/CVE/tree/master/CVE-2023-1829", "creation_timestamp": "2024-01-06T18:45:41.000000Z"}, {"uuid": "44c17d30-c407-4b4f-8f75-5f5d6c8635b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31099", "type": "seen", "source": "https://t.me/arpsyndicate/2400", "content": "#ExploitObserverAlert\n\nCVE-2023-31099\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-31099. Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.\n\nFIRST-EPSS: 0.001760000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T01:36:28.000000Z"}, {"uuid": "00f5366a-0ad6-46a9-a4bc-0114b1ba3071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31099", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3814", "content": "#exploit\n1. CVE-2023-31099:\nZoho ManageEngine Opmanager deserialization RCE\nhttps://xz.aliyun.com/t/13216\n\n2. PoC for webauthn/passkeyss\nhttps://github.com/spbkaizo/go-demo-passkeys\n\n3. Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability\nhttps://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability\n]-&gt; PoC: https://github.com/star-sg/CVE/tree/master/CVE-2023-1829", "creation_timestamp": "2024-01-07T15:08:32.000000Z"}, {"uuid": "ab55ca6b-7929-4fac-b3a8-5329b009ca9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31099", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1804", "content": "https://xz.aliyun.com/t/13216\nCVE-2023-31099\n#exploit", "creation_timestamp": "2024-01-06T19:33:35.000000Z"}, {"uuid": "16ef3522-c806-45eb-8502-7c15a3d35e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-31099", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/300", "content": "https://xz.aliyun.com/t/13216\nCVE-2023-31099\n#exploit", "creation_timestamp": "2024-01-06T16:19:47.000000Z"}]}