{"vulnerability": "cve-2023-34843", "sightings": [{"uuid": "434e7e35-b797-4355-b07a-dcb7b08d2e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8578", "content": "#exploit\n1. CVE-2023-26258:\nRCE in ArcServe UDP Backup\nhttps://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup\n\n2. CVE-2023-34843:\ntraggo/server ver. 0.3 - directory traversal\nhttps://github.com/rootd4ddy/CVE-2023-34843\n\n3. A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk\nhttps://github.com/adhikara13/CVE-2022-4510-WalkingPath", "creation_timestamp": "2023-06-29T11:03:01.000000Z"}, {"uuid": "0f3b9437-437c-401c-b55e-03f4f7440aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "Telegram/rQMVu4dwJRh1-j8AkvL2ouV19FMmA1TDUkwtOokmEHAkfA", "content": "", "creation_timestamp": "2023-07-01T09:06:39.000000Z"}, {"uuid": "445275ca-5083-418c-99b3-6216c1eaaf76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4637", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPublic disclosure for CVE-2023-34843.\nURL\uff1ahttps://github.com/rootd4ddy/CVE-2023-34843\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-28T07:44:18.000000Z"}, {"uuid": "ab31e7c3-743e-4e08-8168-b43496d01334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3780", "content": "\ud83d\udd10DATALEAKS:\n\n\ud83d\udcccSocial Security Administration USA (SSA.gov) Leak : https://www.system32.ink/2023/06/social-security-administration-usa.html\n\n\ud83d\udcccElectrical4all (electrical4all.co.uk) UK Data Leak : https://www.system32.ink/2023/06/electrical4all-electrical4allcouk-uk.html\n\n\ud83d\udcccAuraXR (Mexican 'extended reality' company) DATA Leak : https://www.system32.ink/2023/06/auraxr-mexican-extended-reality-company.html\n\n\ud83d\udcccQWERT SYSTEM (South Korean POS systems) Leak : https://www.system32.ink/2023/06/qwert-system-south-korean-pos-systems.html\n\n\ud83d\udcccTelstra MyRewards (Australian rewards/coupon service) Data Leak : https://www.system32.ink/2023/06/telstra-myrewards-australian.html\n\n\ud83d\udcccDoctorAki (Colombian health website) Data Leak : https://www.system32.ink/2023/06/doctoraki-colombian-health-website-data.html\n\n\ud83d\udcccNovaPay data leak : https://www.system32.ink/2023/06/novapay-data-leak.html\n\n\ud83d\udccc3S Castle Real Estate (3skalegayrimenkul.com.tr) Data Leak : https://www.system32.ink/2023/06/3s-castle-real-estate.html\n\n\ud83e\uddeeExploits: \n\n\ud83d\udcccCVE-2023-34843 POC Traggo/server : https://www.system32.ink/2023/06/cve-2023-34843-poc-traggoserver.html\n\n\ud83d\udcccCVE-2023-2982 Exploit WordPress Social Login and Register Plugin : https://www.system32.ink/2023/06/cve-2023-2982-exploit-wordpress-social.html\n\n\ud83d\udee0Tools:\n\n\ud83d\udcccATSCAN SCANNER - Advanced dork Search &amp; Mass Exploit Scanner : https://www.system32.ink/2023/06/atscan-scanner-advanced-dork-search.html\n\n\ud83d\udcccDecrypt FortiManager configuration secrets (CVE-2020-9289) : https://www.system32.ink/2023/06/decrypt-fortimanager-configuration.html\n\n\ud83d\udcccNoMoreCookies - Browser Protector against various Stealers : https://www.system32.ink/2023/06/nomorecookies-browser-protector-against.html\n\n\ud83d\udc00RAT:\n\n\ud83d\udcccEverspy v1.1 Rat : https://www.system32.ink/2023/06/everspy-v11-rat-cracked-download.html\n\n\ud83e\udee5SCAMPAGE:\n\n\ud83d\udcccBellco Credit Union Scampage : https://www.system32.ink/2023/06/bellco-credit-union-phishing-page.html", "creation_timestamp": "2023-06-30T15:51:30.000000Z"}]}