{"vulnerability": "CVE-2023-3338", "sightings": [{"uuid": "c426975b-1669-49ab-b045-1dd592fee611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33383", "type": "published-proof-of-concept", "source": "Telegram/pNnyEyUJjDG_20ohiyyF1W3gb8AOAT9cfX7NpjKwOJgNHA", "content": "", "creation_timestamp": "2023-10-31T23:42:31.000000Z"}, {"uuid": "19b5e02f-f00a-4f9c-9d2b-8c7ff15e4dfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33381", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4473", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC\nURL\uff1ahttps://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-01T22:58:04.000000Z"}, {"uuid": "9544cf67-d3dd-4965-aa6b-7f309282cb9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33383", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/1029", "content": "CVE-2023-33383\n \u062a\u062c\u0627\u0648\u0632 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0639\u0628\u0631 \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u062e\u0627\u0631\u062c \u0627\u0644\u062d\u062f\u0648\u062f\n\n https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability", "creation_timestamp": "2024-03-31T10:04:50.000000Z"}, {"uuid": "890ecb80-52b5-4271-a017-cfa9e395ea97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3103", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory \n\n\u200b\u200bNosey Parker\n\nA command-line program that finds secrets and sensitive information in textual data and Git history.\n\nhttps://github.com/praetorian-inc/noseyparker\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200b\ud83d\udee1 eBPFShield\n\nA high-performance security tool that utilizes eBPF and Python to provide real-time IP-Intelligence and DNS monitoring. \n\nhttps://github.com/sagarbhure/eBPFShield\n\n#cybersecurity #infosec\n\n\u200b\u200bNetSoc #OSINT\n\nTool focused on extracting information from an account in various Social Networks.\n\nhttps://github.com/XDeadHackerX/NetSoc_OSINT\n\n#cybersecurity #infosec\n\n\u200b\u200bcloudtoolkit\n\nCloud Penetration Testing Toolkit\n\nhttps://github.com/404tk/cloudtoolkit\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bTomcatBackdoorPoC\n\nTomcat backdoor based on CS blog.\n\nhttps://github.com/HackingLZ/TomcatBackdoorPoC\n\nDetails:\nhttps://bit.ly/437Myhb\n\n#infosec #pentesting #redteam\n\n\u200b\u200bNoMoreCookies\n\nBrowser Protector against various stealers, written in C# &amp; C/C++. Works by hooking NtCreateFile and prevent accessing browser files, in addition to prevent it's unhooking. compatible with various games and software.\n\nhttps://github.com/AdvDebug/NoMoreCookies\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-28252\n\nUnderstanding the cve-2022-37969 windows common log file system driver local privilege escalation.\n\nhttps://github.com/fortra/CVE-2023-28252\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-2982\n\nWordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) &lt;= 7.6.4 - Authentication Bypass.\n\nhttps://github.com/RandomRobbieBF/CVE-2023-2982\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-3338\n\nPracticing different Linux kernel exploitation techniques with my DECnet vulnerability and null page mapping enabled.\n\nhttps://github.com/TurtleARM/CVE-2023-3338\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2020-9289\n\nDecrypt reversible secrets encrypted using the default hardcoded key related to CVE-2020-9289 on FortiAnalyzer/FortiManager (the only difference with CVE-2019-6693 is the encryption routine).\n\nhttps://github.com/synacktiv/CVE-2020-9289\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bPDFator\n\nInfoSec project that consists of a Python script and a C application to generate an executable payload. The payload includes functionality to write and execute a PDF file and execute shellcode. Both the PDF file and shellcode are encrypted using XOR and decrypted at runtime.\n\nhttps://github.com/smokeme/PDFator\n\n#cybersecurity #infosec\n\n\u200b\u200bUscrapper \n\n#OSINT tool that allows users to extract various personal information from a website. It leverages web scraping techniques and regular expressions to extract email addresses, social media links, author names, geolocations, phone numbers, and usernames from both hyperlinked and non-hyperlinked sources on the webpage.\n\nhttps://github.com/z0m31en7/Uscrapper\n\n#cybersecurity #infosec\n\n\u200b\u200bGold Digger\n\nA simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist in rapidly searching files obtained during a penetration test.\n\nhttps://github.com/ustayready/golddigger\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bLinux-Exploit-Detection\n\nLinux-based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Rego/Sigma.\n\nhttps://github.com/Loginsoft-Research/Linux-Exploit-Detection\n\n#cybersecurity #infosec\n\n\u200b\u200bdynmx \n\nSignature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces.\n\nhttps://github.com/0x534a/dynmx\n\n#cybersecurity #infosec\n\n\u200b\u200bjsluice\n\nExtract URLs, paths, secrets, and other interesting bits from JavaScript.\n\nhttps://github.com/BishopFox/jsluice\n\n#infosec #pentesting #bugbounty\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-06T11:08:24.000000Z"}, {"uuid": "b167491f-e1bd-4e69-8a86-2cf55d96de5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33381", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3076", "content": "Tools - Hackers Factory \n\nCVE-2023-33733\n\nThis write-up details how an RCE in Reportlab - was found and exploited. Due to the prevalence of Reportlab in HTML to PDF processing, this vulnerability may be reachable in many applications that process PDF files, making this an important one to patch and look out for.\n\nhttps://github.com/c53elyas/CVE-2023-33733\n\n#cve #cybersecurity #infosec\n\nLoki\n\nA Little Web Honeypot.\n\nhttps://github.com/TheKingOfDuck/Loki\n\n#cybersecurity #infosec\n\nPyrai - Mirai python variant\n\nThis is a working variant of the Mirai IOT botnet, this is fully written in Python3. In this paper I'm going to show you how to configure each script in order to setup your PyRai.\n\nhttps://github.com/readloud/PyRai\n\n#cybersecurity #infosec #redteam\n\nCVE-2023-33781\n\nD-Link DIR-842V2 v1.0.3 was discovered to allow a user to run an arbitrary binary when connecting to telnet. This vulnerability can be triggered using backup/restore functionality.\n\nhttps://github.com/s0tr/CVE-2023-33781\n\n#cve #cybersecurity #infosec\n\nCVE-2023-33782\n\nD-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerability in the iperf3 diagnostics functionality.\n\nhttps://github.com/s0tr/CVE-2023-33782\n\n#cve #cybersecurity #infosec\n\nHackBrowserData \n\nCommand-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.\n\nhttps://github.com/moonD4rk/HackBrowserData\n\n#infosec #pentesting #redteam\n\nVMClarity \n\nOpen source tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats such as vulnerabilities, exploits, malware, rootkits, misconfigurations and leaked secrets.\n\nhttps://github.com/openclarity/vmclarity\n\n#cybersecurity #infosec #pentesting\n\nCVE-2023-33246 \n\nRocketMQ Remote Code Execution #Exploit.\n\nhttps://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT\n\n#cve #cybersecurity #infosec\n\n2023-33381\n\nOS command injection on MitraStar GPT-2741GNAC.\n\nhttps://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC\n\n#cve #cybersecurity #infosec\n\nEyeballer\n\nEyeballer is meant for large-scope network penetration tests where you need to find \"interesting\" targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like normal (EyeWitness or GoWitness) and then run them through Eyeballer to tell you what's likely to contain vulnerabilities, and what isn't.\n\nhttps://github.com/BishopFox/eyeballer\n\n#cybersecurity #infosec #pentesting\n\nMultichain Auditor\n\nObservations and tips for auditing protocols on multiple chains \ud83e\uddd0\n\nhttps://github.com/0xJuancito/multichain-auditor\n\n#cybersecurity #infosec\n\nCoraza - Web Application Firewall\n\nCoraza is an open source, enterprise-grade, high performance Web Application Firewall (WAF) ready to protect your beloved applications. It written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set.\n\nhttps://github.com/corazawaf/coraza\n\n#cybersecurity #infosec\n\nCVE-2020-35489\n\nCVE-2020-35489 Vulnerability Scanner in #Wordpress Websites.\n\nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker\n\n#cybersecurity #infosec\n\nRegStrike\n\nA .reg payload generator.\n\nhttps://github.com/itaymigdal/RegStrike\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-05T06:48:53.000000Z"}, {"uuid": "15318285-b10a-4163-81c4-1febbcd8b24f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33383", "type": "published-proof-of-concept", "source": "Telegram/oHTyJXWzQ7gJusCYPkEAxtxlG4lpqxFmrTQDmtPR7jUQ", "content": "", "creation_timestamp": "2023-08-12T18:21:03.000000Z"}, {"uuid": "b837d244-df89-4c5d-8b37-4b2ddd890b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "Telegram/3PxCd54d6nsvEafhXwCEODjvS-THjv_51BT-fEu3rGSehg", "content": "", "creation_timestamp": "2023-06-29T16:14:37.000000Z"}, {"uuid": "de7b1777-7f60-40ba-bb86-b9aed7d77d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "Telegram/vp6-Ps4eU0wjm9En32_zIuCb3MH0v7cWsuDJiajjcXOGTo0", "content": "", "creation_timestamp": "2023-07-15T18:00:37.000000Z"}, {"uuid": "fcb85228-d41e-48ab-8b9c-babda6ebd418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "seen", "source": "https://t.me/proxy_bar/1599", "content": "CVE-2023-3338 \nLinux kernel LPE \nexploit\n\u043f\u043e\u043a\u0430 \u043d\u0435 \u0434\u043e\u0440\u043e\u0433\u043e)\n\n#linux #lpe", "creation_timestamp": "2023-06-29T15:25:33.000000Z"}, {"uuid": "15c3fcf1-0515-4e31-9f38-a7bbdfb0a6d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "Telegram/QQCwqMWIVSuo1zklcAX7MTEKTPsR8_ostIVC3yIEqz9XjT0", "content": "", "creation_timestamp": "2023-08-17T16:46:43.000000Z"}, {"uuid": "fecec0f3-d5c2-4aa5-af9b-54c53c2d9b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/828", "content": "CVE-2023-3338 : Linux kernel LPE practice with an NPD \nRepo : https://github.com/TurtleARM/CVE-2023-3338", "creation_timestamp": "2023-08-16T14:30:00.000000Z"}, {"uuid": "b3f1d04b-cf0b-43f6-8db0-d954ca192597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33383", "type": "seen", "source": "https://t.me/cibsecurity/67590", "content": "\u203c CVE-2023-33383 \u203c\n\nShelly 4PM Pro four-channel smart switch 0.11.0 allows an attacker to trigger a BLE out of bounds read fault condition that results in a device reload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T18:39:16.000000Z"}, {"uuid": "eba4ade5-cfbf-4ef3-897b-7bf8d13057e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3775", "content": "\u2754Dataleaks:\n\n\ud83e\ude85ABC Seamless Data leak : https://www.system32.ink/2023/06/abc-seamless-data-leak.html\n\n\ud83e\ude85McDonald's Data Leaked 2023 : https://www.system32.ink/2023/06/mcdonalds-data-leaked-2023.html\n\n\u2744\ufe0fExploits:\n\n\ud83e\ude85CVE-2023-3338  Linux kernel LPE Exploit : https://www.system32.ink/2023/06/cve-2023-3338-linux-kernel-lpe-exploit.html\n\n\ud83e\ude85CVE-2023-26258-ArcServe RCE Exploit : https://www.system32.ink/2023/06/cve-2023-26258-arcserve-rce-exploit.html\n\n\ud83d\udc01Rats ANd Tools:\n\n\ud83e\ude85Malwoverview - Malware Analysis Tool : https://www.system32.ink/2023/06/malwoverview-malware-analysis-tool.html\n\n\ud83e\ude85EggShell - iOS/macOS/Linux Remote Administration Tool : https://www.system32.ink/2023/06/eggshell-iosmacoslinux-remote.html\n\n\ud83e\ude85Villain C2 Framework : https://www.system32.ink/2023/06/villain-c2-framework.html\n\n\ud83e\ude85Meta BugBounty - Collection of Facebook Bug Bounty Writeups : https://www.system32.ink/2023/06/meta-bugbounty-collection-of-facebook.html\n\n\ud83e\udee5ScamPage:\n\n\ud83e\ude85Banco Continental Private Phishing page  : https://www.system32.ink/2023/06/banco-continental-private-phishing-page.html", "creation_timestamp": "2023-06-30T05:55:16.000000Z"}, {"uuid": "57381686-78f3-4393-a995-dd2d493e5612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33381", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8419", "content": "#exploit\n1. CVE-2023-33381:\nOS command injection on MitraStar GPT-2741GNAC\nhttps://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC\n\n2. CVE-2023-32750:\nPydio Cells &lt;=4.1.2 - Server-Side Request Forgery\nhttps://packetstormsecurity.com/files/172647", "creation_timestamp": "2023-07-05T13:11:08.000000Z"}, {"uuid": "c8cbe923-0940-49e1-9dbb-53a25a0631c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "Telegram/YRMn48o11ORoU5yJQy4uX7tG6UzNzrBG2P0x-ADQlVpUow", "content": "", "creation_timestamp": "2023-07-04T11:51:34.000000Z"}, {"uuid": "cda937fd-43e9-40f1-a0f4-206eef6e6370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33383", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7620", "content": "CVE-2023-33383\nAuthentication Bypass via an out-of-bounds read vulnerability\n\nhttps://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability", "creation_timestamp": "2023-08-04T21:20:14.000000Z"}, {"uuid": "41ed00f3-db48-4b4f-8ee6-a506dca82c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3338", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8583", "content": "#exploit\n1. CVE-2023-20864:\nRCE in VMware Aria Operations for Logs\nhttps://www.zerodayinitiative.com/blog/2023/6/29/cve-2023-20864-remote-code-execution-in-vmware-aria-operations-for-logs\n\n2. CVE-2023-3338:\nLinux kernel LPE\nhttps://github.com/TurtleARM/CVE-2023-3338\n\n3. Netskope Client Service LPE\nhttps://hdwsec.fr/blog/20230622-netskope", "creation_timestamp": "2023-06-30T18:40:56.000000Z"}, {"uuid": "2e1294f6-e228-44e9-8341-01402700e920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33383", "type": "published-proof-of-concept", "source": "Telegram/82TTFmRF8itiNEK_vkODYnmdlxXNOybXZelrQp-3Sw-p", "content": "", "creation_timestamp": "2024-11-11T18:25:20.000000Z"}]}