{"vulnerability": "CVE-2023-2843", "sightings": [{"uuid": "2d67b252-4264-4580-b523-ce045a7ba9f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-09-19T18:10:01.000000Z"}, {"uuid": "db8fe8a3-3193-4065-a0f8-8ac00dd88ac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "a9f65247-24ff-4397-8047-32000d9e2679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971806", "content": "", "creation_timestamp": "2024-12-24T20:34:17.462299Z"}, {"uuid": "391b3872-b2fe-46f1-9608-d29ce2f2e418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971887", "content": "", "creation_timestamp": "2024-12-24T20:35:16.036816Z"}, {"uuid": "35eab2e2-6509-4a30-a0a2-98bf4d3ef009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lezuydfphi2n", "content": "", "creation_timestamp": "2025-01-06T00:30:35.010698Z"}, {"uuid": "2304b77c-560b-49d7-bba8-ca8d699eaaaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-04)", "content": "", "creation_timestamp": "2025-02-04T00:00:00.000000Z"}, {"uuid": "3d4ecdc2-7fed-42d5-a211-5a23e751bda5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-10)", "content": "", "creation_timestamp": "2024-11-10T00:00:00.000000Z"}, {"uuid": "02ea0f42-1c32-4098-a227-ee900006e552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-12)", "content": "", "creation_timestamp": "2024-11-12T00:00:00.000000Z"}, {"uuid": "cf9992ef-f4d0-4412-8291-3259bf0d2f94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-22)", "content": "", "creation_timestamp": "2024-11-22T00:00:00.000000Z"}, {"uuid": "62910f3a-274a-4113-882c-a46f265b5b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-29)", "content": "", "creation_timestamp": "2024-11-29T00:00:00.000000Z"}, {"uuid": "7f032870-d0e1-4a0d-a3c2-198f073dc352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "547ed518-207e-4be1-ac9f-d20166861744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-25)", "content": "", "creation_timestamp": "2024-12-25T00:00:00.000000Z"}, {"uuid": "80c1e6bd-8c4a-4607-94cd-a2006cda0487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:53.000000Z"}, {"uuid": "7ac07f27-9507-46db-9f00-fc443b0c4472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "c46eac71-7b9d-4312-adb2-6dea4c1d744d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:46.000000Z"}, {"uuid": "c4bbff5b-399c-4640-9380-095ec35eba4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "58153d47-ee91-46b5-b69c-ebc948e2aad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:42.000000Z"}, {"uuid": "4f538f47-393e-4037-85fb-422a8a9c7c4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "2245d6c4-c806-4951-9ddd-209dbaac53de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-02)", "content": "", "creation_timestamp": "2025-04-02T00:00:00.000000Z"}, {"uuid": "a6505ec1-c5e4-4be2-b4fe-3bdcabb0101a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-01)", "content": "", "creation_timestamp": "2025-07-01T00:00:00.000000Z"}, {"uuid": "901e388e-2aec-4017-bf14-f53f2a7f6e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "a220a689-05f7-4bb7-a873-956df2fdb730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-07)", "content": "", "creation_timestamp": "2025-04-07T00:00:00.000000Z"}, {"uuid": "c2be8f6e-9560-4076-a0c2-88ea03d229b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "f129aa43-51da-4a00-9cb0-f8d1714f737b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-07)", "content": "", "creation_timestamp": "2025-07-07T00:00:00.000000Z"}, {"uuid": "8e70655a-15bf-4a84-a4f9-df9db1a2b761", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-12)", "content": "", "creation_timestamp": "2025-07-12T00:00:00.000000Z"}, {"uuid": "abafd656-690e-4bab-90f1-63d3041412a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "1b4eb12e-e16d-4bfd-bbb4-1c8f9f7586d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "f2860847-cfb1-4e16-bafc-ebca0c32f9fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-31)", "content": "", "creation_timestamp": "2025-07-31T00:00:00.000000Z"}, {"uuid": "3abf4a3d-caed-41cc-ac9e-1df3f8851671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}, {"uuid": "4ae69242-8ccb-4318-883b-84c813e312db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "593613a4-9760-48a8-a72c-a15654e7912a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-16)", "content": "", "creation_timestamp": "2025-09-16T00:00:00.000000Z"}, {"uuid": "58096979-964b-4ecf-afad-6b1d26ac3e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-21)", "content": "", "creation_timestamp": "2025-09-21T00:00:00.000000Z"}, {"uuid": "78d9aa19-af56-4c94-a495-8bd4cd622c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://bsky.app/profile/intcyberdigest.bsky.social/post/3mfcegt3al22l", "content": "", "creation_timestamp": "2026-02-20T14:54:38.207441Z"}, {"uuid": "62370433-355c-4dd3-9dec-cf6ebecd14c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-22)", "content": "", "creation_timestamp": "2025-10-22T00:00:00.000000Z"}, {"uuid": "a10896b8-cda7-44e0-a9a4-eedbd0cc3f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/minio_bootstrap_verify_info_disc.rb", "content": "", "creation_timestamp": "2024-03-11T14:10:38.000000Z"}, {"uuid": "5b4dac9e-7be8-4da3-8816-c733689009c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-14)", "content": "", "creation_timestamp": "2025-10-14T00:00:00.000000Z"}, {"uuid": "2372bc36-ecf9-4b07-95ea-20600cef405c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "5ceca5aa-54b7-4abe-8e90-7175fa03044f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-24)", "content": "", "creation_timestamp": "2025-12-24T00:00:00.000000Z"}, {"uuid": "cfcc06e1-c7a2-4fec-a899-608c9f4e5154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-10)", "content": "", "creation_timestamp": "2025-12-10T00:00:00.000000Z"}, {"uuid": "7e336ab9-debe-4155-8fe3-2465cbbb7e8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "a3e372d6-5cef-4a83-b1f8-7180795d3427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)", "content": "", "creation_timestamp": "2026-01-02T00:00:00.000000Z"}, {"uuid": "d193714d-08de-4eba-a02f-c66a9a0b8b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)", "content": "", "creation_timestamp": "2025-12-28T00:00:00.000000Z"}, {"uuid": "21b331dd-1074-48bc-a92e-c8b4c560e7b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "e557b7f1-e597-4ac0-8640-4a2b7d566417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "b83faae9-46ae-4fdd-81dc-2fa348865c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "a7d94c5d-1fe1-4957-bd44-40425158320f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "4f9e8bca-0b25-4bfa-96d4-6046cfab2bcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "912039ac-947b-4b14-b812-afa2f1665901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "f0efa3b5-93fe-4c81-9d04-0b4b271f72f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-18)", "content": "", "creation_timestamp": "2026-01-18T00:00:00.000000Z"}, {"uuid": "0c25d74a-2878-4ae1-8f6e-181b434e612a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-24)", "content": "", "creation_timestamp": "2026-03-24T00:00:00.000000Z"}, {"uuid": "505e30d2-3114-4012-af7e-dd068eeba58a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28431", "type": "seen", "source": "https://gist.github.com/alon710/c2312e669de51117cddb6fb7c6d3231c", "content": "", "creation_timestamp": "2026-01-24T22:43:06.000000Z"}, {"uuid": "2b86e02f-b3a4-40a8-94cc-ab0bb715e6ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-11)", "content": "", "creation_timestamp": "2026-04-11T00:00:00.000000Z"}, {"uuid": "7b444e78-8897-4c53-a65f-48ef364ceb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-25)", "content": "", "creation_timestamp": "2026-01-25T00:00:00.000000Z"}, {"uuid": "f32cc968-5730-476d-b779-0b13588ba569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28431", "type": "seen", "source": "https://gist.github.com/alon710/efbde61109747741050261b3551d59be", "content": "", "creation_timestamp": "2026-01-24T22:43:05.000000Z"}, {"uuid": "be5c43b8-7c7c-4e03-8d0d-5c825a9206bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-28434", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/0df09428-2a3f-49b5-9106-82db439c7146", "content": "", "creation_timestamp": "2026-02-02T12:26:50.226352Z"}, {"uuid": "c7509c5a-5123-439b-a17e-78baf3b9091d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/732e55ae-b898-42da-a434-7bcdc36380f6", "content": "", "creation_timestamp": "2026-02-02T12:27:00.412671Z"}, {"uuid": "ee63f292-3434-437f-a6da-c2a3cffc033c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-22)", "content": "", "creation_timestamp": "2026-04-22T00:00:00.000000Z"}, {"uuid": "ad9d90b8-3457-422c-9719-0fadb02de63a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/community/detectors/minio_cve_2023_28432", "content": "", "creation_timestamp": "2023-04-10T07:23:34.000000Z"}, {"uuid": "26dbc490-5447-41e0-a14c-448a924d5b0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4063", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28432 MinIO\u654f\u611f\u4fe1\u606f\u6cc4\u9732\u68c0\u6d4b\u811a\u672c\nURL\uff1ahttps://github.com/Cuerz/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-29T01:31:42.000000Z"}, {"uuid": "6b1a1494-9ee9-4f78-a387-a86446e750b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-21)", "content": "", "creation_timestamp": "2026-04-21T00:00:00.000000Z"}, {"uuid": "737c97dc-f798-47f0-a6d4-c12f3b887b5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4018", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28434 nuclei templates\nURL\uff1ahttps://github.com/Mr-xn/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-23T15:55:52.000000Z"}, {"uuid": "8629aeb5-0580-4a73-b0e2-c078359b0c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4019", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432) \nURL\uff1ahttps://github.com/gobysec/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-23T16:34:19.000000Z"}, {"uuid": "3cc94d0c-b644-430e-83d9-52479885398b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4139", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aTest environments for CVE-2023-28432, information disclosure in MinIO clusters\nURL\uff1ahttps://github.com/h0ng10/CVE-2023-28432_docker\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-09T20:37:53.000000Z"}, {"uuid": "4b97b7b7-701a-4123-890e-10bf16502551", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4052", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aEXP for CVE-2023-28434 MinIO unauthorized to RCE\nURL\uff1ahttps://github.com/AbelChe/evil_minio\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-27T09:01:16.000000Z"}, {"uuid": "3a479605-6d07-4e20-86df-f59efb30a4c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4954", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28432\u68c0\u6d4b\u5de5\u5177\nURL\uff1ahttps://github.com/bingtangbanli/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-21T06:05:42.000000Z"}, {"uuid": "343c4098-ffe1-4b0a-946c-ce266442e7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4027", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28432 POC\nURL\uff1ahttps://github.com/acheiii/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-24T08:39:24.000000Z"}, {"uuid": "73662cdf-dcf7-4f16-9781-61bc558ba452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4025", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28432,minio\u672a\u6388\u6743\u8bbf\u95ee\u68c0\u6d4b\u5de5\u5177\nURL\uff1ahttps://github.com/Okaytc/minio_unauth_check\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-24T03:22:36.000000Z"}, {"uuid": "3d0b74b3-d2f2-444f-a0f7-cc854200bd5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4018", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28434 nuclei templates\nURL\uff1ahttps://github.com/Mr-xn/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-23T15:55:52.000000Z"}, {"uuid": "f21dfbfb-a966-495b-9f4b-6afff43ff865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4955", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28432\u68c0\u6d4b\u5de5\u5177\nURL\uff1ahttps://github.com/bingtangbanli/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-21T06:05:42.000000Z"}, {"uuid": "c6c66391-1fc9-4c23-9846-f9403aaaf8fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6054", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432\nURL\uff1ahttps://github.com/Romanc9/Gui-poc-test\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-03T13:47:08.000000Z"}, {"uuid": "b18be476-5f9a-4b82-997a-3d7aa5c3f47d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4016", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28434 nuclei templates\nURL\uff1ahttps://github.com/Mr-xn/CVE-2023-28434\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-23T14:52:47.000000Z"}, {"uuid": "421b3019-e066-4c1e-9554-7d7916589893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-24)", "content": "", "creation_timestamp": "2026-04-24T00:00:00.000000Z"}, {"uuid": "edf1efc8-7342-4351-b528-12244d219f48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6103", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-28432\nURL\uff1ahttps://github.com/C1ph3rX13/CVE-2023-28432\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-07T03:34:57.000000Z"}, {"uuid": "dd53bd5b-89be-4fdf-8c51-503157599557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://t.me/arpsyndicate/1988", "content": "#ExploitObserverAlert\n\nCVE-2023-28432\n\nDESCRIPTION: Exploit Observer has 42 entries related to CVE-2023-28432. Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.\n\nFIRST-EPSS: 0.147430000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T12:52:50.000000Z"}, {"uuid": "472150e2-83e8-4f50-9313-f832d5a6ad99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "Telegram/aWti5-JhGyF6ZpeB5FIru3CePw7DBIzJEc_PK-w4Sy1PbJA", "content": "", "creation_timestamp": "2023-04-22T16:39:36.000000Z"}, {"uuid": "071be4a3-85f4-4125-b68b-6ef73e074797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "Telegram/Z_C7-a2w6rvnW7HtxH79xI_MQxL3zFfJww2jFnjkPq6SeE0", "content": "", "creation_timestamp": "2023-05-03T10:32:24.000000Z"}, {"uuid": "7e087595-d0d1-49f3-aec6-e8ee2dbf837c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "Telegram/fxtlt0FR2gPXkkvHwdQoUKMqVqE1YDpYCW5PDxLwX___5Q", "content": "", "creation_timestamp": "2023-04-22T10:11:46.000000Z"}, {"uuid": "114daa55-c2f4-489c-96a6-7cb3bf7c084a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://t.me/arpsyndicate/600", "content": "#ExploitObserverAlert\n\nCVE-2023-28432\n\nDESCRIPTION: Exploit Observer has 41 entries related to CVE-2023-28432. Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.\n\nFIRST-EPSS: 0.156100000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-27T22:23:12.000000Z"}, {"uuid": "f87fcc29-ad75-4ad2-8c58-b8d5217c3561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://t.me/arpsyndicate/1542", "content": "#ExploitObserverAlert\n\nCVE-2023-28432\n\nDESCRIPTION: Exploit Observer has 42 entries related to CVE-2023-28432. Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.\n\nFIRST-EPSS: 0.156100000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-08T00:05:12.000000Z"}, {"uuid": "abb77984-f439-4db9-9295-0956ffeec67b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://t.me/arpsyndicate/1579", "content": "#ExploitObserverAlert\n\nCVE-2023-28432\n\nDESCRIPTION: Exploit Observer has 42 entries related to CVE-2023-28432. Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.\n\nFIRST-EPSS: 0.156100000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-09T23:44:07.000000Z"}, {"uuid": "373c520b-9edb-4276-8002-fa306c70969a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "https://t.me/KomunitiSiber/94", "content": "CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug\nhttps://thehackernews.com/2023/04/cisa-adds-3-actively-exploited-flaws-to.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.\nThe\u00a0three vulnerabilities\u00a0are as follows -\n\nCVE-2023-28432\u00a0(CVSS score - 7.5) - MinIO Information Disclosure Vulnerability\u00a0\nCVE-2023-27350\u00a0(CVSS score - 9.8) - PaperCut MF/NG Improper Access Control", "creation_timestamp": "2023-04-22T09:51:45.000000Z"}, {"uuid": "5544f85a-2a04-4102-83ff-b89d32f45a8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3456", "content": "https://github.com/yTxZx/CVE-2023-28432\n#github", "creation_timestamp": "2023-10-21T15:26:44.000000Z"}, {"uuid": "721edac3-ed29-45a7-a2a4-09f0273dc97c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2843", "type": "seen", "source": "https://t.me/cibsecurity/67886", "content": "\u203c CVE-2023-2843 \u203c\n\nThe MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.15 does not properly sanitize and escape a parameter before using it in an SQL statement, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T18:14:02.000000Z"}, {"uuid": "d5887121-cb7d-4a7b-af6a-f8791cd52ecb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3201", "content": "Hackers Factory \n\nA collection of resources for linux reverse engineering\n\nhttps://github.com/michalmalik/linux-re-101\n\nA tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nA tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.\n\nhttps://github.com/ShorSec/ShadowSpray\n\nEXP for CVE-2023-28434 MinIO unauthorized to RCE\n\nhttps://github.com/AbelChe/evil_minio\n\nThis is a Proof of Concept (PoC) for CVE-2023-3244, a vulnerability in comment-like-dislike. The PoC demonstrates the exploitability of this vulnerability and serves as a reference for security researchers and developers to better understand and mitigate the risk associated with this issue.\n\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\nNextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix\n\nhttps://github.com/Nextdoor/cspm_evaluation_matrix\n\nMass Exploit - CVE-2023-1698 &lt; Unauthenticated Remote Command Execution\n\nhttps://github.com/codeb0ss/CVE-2023-1698-PoC\n\nPassive subdomain continous monitoring tool\n\nhttps://github.com/e1abrador/sub.Monitor\n\nAn exploit for OpenTSDB &lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nA collection of awesome one-liners for bug bounty hunting.\n\nhttps://github.com/0xPugazh/One-Liners\n\nThis is a useful Python script for extracting bug bounty.\n\nhttps://github.com/St74nger/writeup-miner\n\nThis repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security enthusiasts during their reconnaissance and vulnerability assessment processes.\n\nhttps://github.com/bhavesh-pardhi/Wordlist-Hub\n\nKQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules &amp; Hunting Rules.\n\nhttps://github.com/Bert-JanP/Hunting-Queries-Detection-Rules\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-10-23T21:34:09.000000Z"}, {"uuid": "5988dda2-bc49-4231-83d4-e47df11075f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28439", "type": "seen", "source": "https://t.me/ctinow/181990", "content": "https://ift.tt/GR07LNV\nCVE-2023-28439 | Oracle Analytics Desktop 6.4.0.0.0/7.0.0.0.0 Visual Analyzer Integration cross site scripting", "creation_timestamp": "2024-02-09T12:51:19.000000Z"}, {"uuid": "424af543-cdf2-40d6-8421-fdad8c011c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://t.me/thehackernews/3271", "content": "U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds 3 vulnerabilities to its KEV catalog due to active exploitation!\n\nRead details: https://thehackernews.com/2023/04/cisa-adds-3-actively-exploited-flaws-to.html\n\n\u2705 CVE-2023-28432\n\u2705 CVE-2023-27350\n\u2705 CVE-2023-2136", "creation_timestamp": "2023-04-22T08:22:51.000000Z"}, {"uuid": "38654891-c2eb-49bf-8b02-baa01572c786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28430", "type": "seen", "source": "https://t.me/cibsecurity/60852", "content": "\u203c CVE-2023-28430 \u203c\n\nOneSignal is an email, sms, push notification, and in-app message service for mobile apps.The Zapier.yml workflow is triggered on issues (types: [closed]) (i.e., when an Issue is closed). The workflow starts with full write-permissions GitHub repository token since the default workflow permissions on Organization/Repository level are set to read-write. This workflow runs the following step with data controlled by the comment `(${{ github.event.issue.title }} \u00e2\u20ac\u201c the full title of the Issue)`, allowing an attacker to take over the GitHub Runner and run custom commands, potentially stealing any secret (if used), or altering the repository. This issue was found with CodeQL using javascript\u00e2\u20ac\u2122s Expression injection in Actions query. This issue has been addressed in the repositories github action. No actions are required by users. This issue is also tracked as `GHSL-2023-051`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T02:26:23.000000Z"}, {"uuid": "2dae87e8-52f2-4a0a-8447-d900e90332a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28433", "type": "seen", "source": "https://t.me/cibsecurity/60534", "content": "\u203c CVE-2023-28433 \u203c\n\nMinio is a Multi-Cloud Object Storage framework. All users on Windows prior to version RELEASE.2023-03-20T20-16-18Z are impacted. MinIO fails to filter the `\\` character, which allows for arbitrary object placement across buckets. As a result, a user with low privileges, such as an access key, service account, or STS credential, which only has permission to `PutObject` in a specific bucket, can create an admin user. This issue is patched in RELEASE.2023-03-20T20-16-18Z. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:24.000000Z"}, {"uuid": "4064801a-de52-4482-b7dd-96ef2a4b5422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "seen", "source": "https://t.me/cibsecurity/60516", "content": "\u203c CVE-2023-28434 \u203c\n\nMinio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:35:58.000000Z"}, {"uuid": "8f9082b4-e881-408e-addf-643e6c883835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28437", "type": "seen", "source": "https://t.me/cibsecurity/60728", "content": "\u203c CVE-2023-28437 \u203c\n\nDataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-25T06:38:02.000000Z"}, {"uuid": "2d0c2530-5126-4785-84dc-c8e4835af868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}, {"uuid": "79b19696-8d1c-4f6c-bdfd-87f97144dbc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28438", "type": "seen", "source": "https://t.me/cibsecurity/60530", "content": "\u203c CVE-2023-28438 \u203c\n\nPimcore is an open source data and experience management platform. Prior to version 10.5.19, since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link. Users should upgrade to version 10.5.19 to receive a patch or, as a workaround, may apply the patch manually.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:20.000000Z"}, {"uuid": "e9e1f691-397c-4dbb-992f-97f0f85818f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28439", "type": "seen", "source": "https://t.me/cibsecurity/60526", "content": "\u203c CVE-2023-28439 \u203c\n\nCKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed packages. The vulnerability may trigger a JavaScript code after fulfilling special conditions: using one of the affected packages on a web page with missing proper Content Security Policy configuration; initializing the editor on an element and using an element other than `` as a base; and destroying the editor instance. This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism. A fix is available in CKEditor4 version 4.21.0. In some rare cases, a security fix may be considered a breaking change. Starting from version 4.21.0, the Iframe Dialog plugin applies the `sandbox` attribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure the `config.iframe_attributes` option. Also starting from version 4.21.0, the Media Embed plugin regenerates the entire content of the embed widget by default. To change this behavior, configure the `config.embed_keepOriginalContent` option. Those who choose to enable either of the more permissive options or who cannot upgrade to a patched version should properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on their web page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:13.000000Z"}, {"uuid": "90e86779-fc04-46a2-896a-0f983693d79e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "seen", "source": "https://t.me/cibsecurity/60525", "content": "\u203c CVE-2023-28432 \u203c\n\nMinio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-22T23:36:12.000000Z"}, {"uuid": "966f40ab-44ae-492e-ba6c-9bdd0f0657c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "https://t.me/webpwn/349", "content": "\u0415\u0441\u0442\u044c \u0442\u0430\u043a\u0430\u044f \u0448\u0442\u0443\u043a\u0430 \u0434\u043b\u044f \u0445\u0430\u0439\u043b\u043e\u0430\u0434\u0430 - MinIO\n\n\u041e\u0431\u044a\u0435\u043a\u0442\u043d\u043e\u0435 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u043d\u0430 Go.\n\u0417\u0430\u0431\u0430\u0432\u043d\u043e, \u043a\u0430\u043a POST \u0437\u0430\u043f\u0440\u043e\u0441 \u043d\u0430 \u0440\u0443\u0447\u043a\u0443 /minio/bootstrap/v1/verify \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0435\u0433\u043e \u0441\u0435\u043a\u0440\u0435\u0442\u044b.\n\n\u0411\u0430\u0433\u0430 \u043f\u0440\u043e\u0433\u0440\u0435\u043c\u0435\u043b\u0430 (CVE-2023-28432) \u0432 \u041a\u0438\u0442\u0430\u0435 (\u0432\u043e\u0442 \u0440\u0430\u0437\u0431\u043e\u0440), \u0430 \u0443 \u043d\u0430\u0441 \u0447\u0435\u0442 \u043d\u0435 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u043b, \u043f\u043e\u043a\u0430 \u0441\u0430\u043c \u043d\u0435 \u043d\u0430\u0442\u043a\u043d\u0443\u043b\u0441\u044f.", "creation_timestamp": "2023-10-16T12:38:26.000000Z"}, {"uuid": "3ffe7e75-b0f4-4541-995d-8789461638f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "exploited", "source": "https://t.me/thehackernews/3824", "content": "An unknown attacker exploited vulnerabilities (CVE-2023-28432 and CVE-2023-28434) in MinIO storage system for unauthorized code execution. How did they backdoor it? \n \nDetails revealed by Security Joes: https://thehackernews.com/2023/09/hackers-exploit-minio-storage-system.html", "creation_timestamp": "2023-09-04T16:15:50.000000Z"}, {"uuid": "99db11af-0505-46a6-ab78-28038d9b2d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "exploited", "source": "https://t.me/thehackernews/3824", "content": "An unknown attacker exploited vulnerabilities (CVE-2023-28432 and CVE-2023-28434) in MinIO storage system for unauthorized code execution. How did they backdoor it? \n \nDetails revealed by Security Joes: https://thehackernews.com/2023/09/hackers-exploit-minio-storage-system.html", "creation_timestamp": "2023-09-04T16:15:50.000000Z"}, {"uuid": "66d89f17-aa6a-4c98-b170-1cdaa2562d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1110", "content": "https://github.com/AbelChe/evil_minio\nEXP for CVE-2023-28434 MinIO unauthorized to RCE\n\nCVE\u51fa\u53e3-2023-28434 MinIO\u672a\u6388\u6743\u5230RCE\n#github #exploit", "creation_timestamp": "2023-10-09T18:28:04.000000Z"}, {"uuid": "965308ad-0461-4237-88d4-2f9f814ee9f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1332", "content": "https://github.com/yTxZx/CVE-2023-28432\n#github", "creation_timestamp": "2023-10-21T12:12:23.000000Z"}, {"uuid": "d5b1d1ef-386a-4e9e-b009-deb382b6096a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8035", "content": "#exploit\n1. InjectGPT: the most polite exploit ever\nhttps://blog.luitjes.it/posts/injectgpt-most-polite-exploit-ever\n\n2. CVE-2023-28432:\nMulti-Cloud Object Storage Minio info leak leads to RCE\nhttps://y4er.com/posts/minio-cve-2023-28432", "creation_timestamp": "2023-04-01T13:48:18.000000Z"}, {"uuid": "7d837377-a6d2-4395-be6a-003ee75a1186", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9015", "content": "#exploit\n1. CVE-2023-28434:\nMinIO unauthorized to RCE\nhttps://github.com/AbelChe/evil_minio\n\n2. CVE-2023-3959, CVE-2023-4249:\nMultiple critical vulnerabilities in Zavio IP cameras\nhttps://bugprove.com/knowledge-hub/cve-2023-3959-cve-2023-4249-multiple-critical-vulnerabilities-in-zavio-ip-cameras\n\n3. CVE-2023-4809:\nFreeBSD pf bypass when using IPv6\nhttps://www.enricobassetti.it/2023/09/cve-2023-4809-freebsd-pf-bypass-when-using-ipv6", "creation_timestamp": "2023-09-13T11:01:01.000000Z"}, {"uuid": "a47818ec-f452-4e4a-8059-46b5e9273a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28434", "type": "seen", "source": "https://t.me/Rootsec_2/962", "content": "#exploit\n1. CVE-2023-28434:\nMinIO unauthorized to RCE\nhttps://github.com/AbelChe/evil_minio\n\n2. CVE-2023-3959, CVE-2023-4249:\nMultiple critical vulnerabilities in Zavio IP cameras\nhttps://bugprove.com/knowledge-hub/cve-2023-3959-cve-2023-4249-multiple-critical-vulnerabilities-in-zavio-ip-cameras\n\n3. CVE-2023-4809:\nFreeBSD pf bypass when using IPv6\nhttps://www.enricobassetti.it/2023/09/cve-2023-4809-freebsd-pf-bypass-when-using-ipv6", "creation_timestamp": "2024-08-16T08:24:29.000000Z"}, {"uuid": "af128a74-22ef-495d-b7d0-007a2b6d3632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8888", "content": "#exploit\n1. CVE-2023-28432:\nMinIO Information Disclosure\nhttps://github.com/bingtangbanli/CVE-2023-28432\n\n2. CVE-2023-20562:\nExploring Vulns in AMD's Windows Kernel Drivers...\nhttps://github.com/passwa11/HITCON-2023-Demo-CVE-2023-20562", "creation_timestamp": "2023-08-21T22:30:15.000000Z"}, {"uuid": "1462281a-f8e9-4ce4-b720-6140287bf8c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9238", "content": "#exploit\n1. CVE-2023-34051:\nVMware Aria Operations for Logs - authentication bypass\nhttps://github.com/horizon3ai/CVE-2023-34051\n\n2. CVE-2023-28432:\nMinIO information disclosure\nhttps://github.com/yTxZx/CVE-2023-28432", "creation_timestamp": "2023-10-21T17:07:26.000000Z"}, {"uuid": "02e7ac9f-c93c-4506-b7a2-862eaad5176a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28432", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1453", "content": "#exploit\n1. CVE-2023-34051:\nVMware Aria Operations for Logs - authentication bypass\nhttps://github.com/horizon3ai/CVE-2023-34051\n\n2. CVE-2023-28432:\nMinIO information disclosure\nhttps://github.com/yTxZx/CVE-2023-28432", "creation_timestamp": "2024-08-16T08:37:53.000000Z"}]}