{"vulnerability": "cve-2023-4293", "sightings": [{"uuid": "15c0be3b-52a9-4bc8-9948-289fd569d754", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42931", "type": "published-proof-of-concept", "source": "Telegram/wRnl8ntDAGY7eTPUGTtFqIuU6Tsi3Eou0FYkl74XLLXvV2Q", "content": "", "creation_timestamp": "2025-07-27T21:00:04.000000Z"}, {"uuid": "857b9b32-ae0a-4656-85a0-aef640041e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42938", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9471", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42938\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved checks. This issue is fixed in iTunes 12.13.1 for Windows. A local attacker may be able to elevate their privileges.\n\ud83d\udccf Published: 2024-03-14T18:24:02.258Z\n\ud83d\udccf Modified: 2025-03-28T20:47:45.124Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214091\n2. https://support.apple.com/kb/HT214091", "creation_timestamp": "2025-03-28T21:29:03.000000Z"}, {"uuid": "50875f9f-b54c-4842-91f3-149dcb86930b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42939", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9505", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-42939\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1. A user's private browsing activity may be unexpectedly saved in the App Privacy Report.\n\ud83d\udccf Published: 2024-02-21T06:40:49.771Z\n\ud83d\udccf Modified: 2025-03-28T23:09:12.813Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213982", "creation_timestamp": "2025-03-28T23:29:29.000000Z"}, {"uuid": "4cbb1b6e-6c28-48ce-a452-6d6c6b2872ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42938", "type": "seen", "source": "https://t.me/ctinow/208099", "content": "https://ift.tt/3z6dQeX\nCVE-2023-42938", "creation_timestamp": "2024-03-14T20:26:56.000000Z"}, {"uuid": "808d5dd0-dc13-4399-b38a-9d30eda4c67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42938", "type": "seen", "source": "https://t.me/ctinow/208113", "content": "https://ift.tt/3z6dQeX\nCVE-2023-42938", "creation_timestamp": "2024-03-14T20:31:57.000000Z"}, {"uuid": "de15ac3b-b73a-4df1-b682-f0381f06bb06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42931", "type": "seen", "source": "https://t.me/proxy_bar/1961", "content": "CVE-2023-42931 Apple macOS LPE\n*\nAffected:\nMacOS Sonoma before 14.2\nMacOS Ventura before 13.6.3\nMacOS Monterey before 12.7.2\n*\n\u0412\u0435\u0441\u044c \u043f\u0443\u0442\u044c \u0442\u0443\u0442\n\n#macos", "creation_timestamp": "2024-03-26T15:44:43.000000Z"}, {"uuid": "47993cdc-44a5-4c0e-966a-f8ef4677af7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42931", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2796", "content": "#exploit\n1. CVE-2023-50969:\nImperva SecureSphere WAF Bypass for POST Data Inspection Rules\nhttps://www.hoyahaxa.com/2024/03/imperva-waf-bypass-cve-2023-50969.html\n\n2. CVE-2023-42931:\nLPE through Apple macOS filesystems\nhttps://www.alter-solutions.fr/blog/local-privilege-escalating-my-way-to-root-throught-apple-macos-filesystems", "creation_timestamp": "2024-08-16T09:16:38.000000Z"}, {"uuid": "dd9282fd-58db-4437-a437-cc09bc00aca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42937", "type": "seen", "source": "https://t.me/ctinow/186503", "content": "https://ift.tt/6htxwmK\nCVE-2023-42937 | Apple macOS information disclosure", "creation_timestamp": "2024-02-16T16:52:00.000000Z"}, {"uuid": "a0cd95de-8d55-469a-a2b1-75704bf7dfd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42933", "type": "seen", "source": "https://t.me/ctinow/170794", "content": "https://ift.tt/UYofPQM\nCVE-2023-42933 | Apple macOS Dev Tools Privilege Escalation", "creation_timestamp": "2024-01-21T10:16:52.000000Z"}, {"uuid": "372590a4-d100-41e4-a8ed-d98fec480078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42934", "type": "seen", "source": "https://t.me/ctinow/170784", "content": "https://ift.tt/Y5gjLve\nCVE-2023-42934 | Apple macOS Photos Storage Privilege Escalation", "creation_timestamp": "2024-01-21T09:36:26.000000Z"}, {"uuid": "a964b76c-503f-4876-8724-4ea791358f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42934", "type": "seen", "source": "https://t.me/ctinow/175800", "content": "https://ift.tt/U4bAc83\nCVE-2023-42934 | Apple iOS/iPadOS up to 16.x App information disclosure", "creation_timestamp": "2024-01-30T10:11:46.000000Z"}, {"uuid": "b0488ca0-9cb5-41a9-ae30-7affd2d6e3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4293", "type": "seen", "source": "https://t.me/cibsecurity/68388", "content": "\u203c CVE-2023-4293 \u203c\n\nThe Premium Packages - Sell Digital Products Securely plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.7.4 due to insufficient restriction on the 'wpdmpp_update_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'profile[role]' parameter during a profile update.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-12T12:17:18.000000Z"}, {"uuid": "337f6fc9-1b5f-4ad4-9f10-1151df89ea51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42939", "type": "seen", "source": "https://t.me/ctinow/189318", "content": "https://ift.tt/nxr7Kom\nCVE-2023-42939", "creation_timestamp": "2024-02-21T08:31:44.000000Z"}, {"uuid": "1325f5b4-d798-4ac2-9e1a-4f0a65af133c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42937", "type": "seen", "source": "https://t.me/ctinow/186492", "content": "https://ift.tt/5EaPkgS\nCVE-2023-42937 | Apple watchOS information disclosure", "creation_timestamp": "2024-02-16T16:21:43.000000Z"}, {"uuid": "b8c3f751-137d-481d-8e46-58ba93172101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42937", "type": "seen", "source": "https://t.me/ctinow/186491", "content": "https://ift.tt/cJyUM9W\nCVE-2023-42937 | Apple iOS/iPadOS information disclosure", "creation_timestamp": "2024-02-16T16:21:42.000000Z"}, {"uuid": "e5334f50-2608-4dab-bb70-4acf565f17f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42935", "type": "seen", "source": "https://t.me/ctinow/186490", "content": "https://ift.tt/m6v4fkR\nCVE-2023-42935 | Apple macOS up to 13.6.3 Desktop improper authentication", "creation_timestamp": "2024-02-16T16:21:41.000000Z"}, {"uuid": "8dddf93c-8a67-42b8-862e-bbc496b9870d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42937", "type": "seen", "source": "https://t.me/ctinow/171627", "content": "https://ift.tt/Wt1bQMa\nCVE-2023-42937", "creation_timestamp": "2024-01-23T02:31:43.000000Z"}, {"uuid": "18370fdd-4863-4203-8819-2fcbae139141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42935", "type": "seen", "source": "https://t.me/ctinow/171626", "content": "https://ift.tt/4UlbzGp\nCVE-2023-42935", "creation_timestamp": "2024-01-23T02:31:42.000000Z"}, {"uuid": "58c4ed5e-1767-4a24-be61-8938cf08be5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42932", "type": "seen", "source": "https://t.me/ctinow/161618", "content": "https://ift.tt/MJwrep9\nCVE-2023-42932 | Apple macOS up to 12.7.1/13.6.2/14.1 Local Privilege Escalation (HT214036)", "creation_timestamp": "2024-01-02T09:36:27.000000Z"}, {"uuid": "722a6fbf-3f09-4da5-866a-9955ab01f0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42931", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10261", "content": "#exploit\n1. CVE-2023-50969:\nImperva SecureSphere WAF Bypass for POST Data Inspection Rules\nhttps://www.hoyahaxa.com/2024/03/imperva-waf-bypass-cve-2023-50969.html\n\n2. CVE-2023-42931:\nLPE through Apple macOS filesystems\nhttps://www.alter-solutions.fr/blog/local-privilege-escalating-my-way-to-root-throught-apple-macos-filesystems", "creation_timestamp": "2024-04-02T10:58:01.000000Z"}]}