{"vulnerability": "CVE-2023-3408", "sightings": [{"uuid": "f1baf0b1-fa36-4f02-be6d-5159a4097b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3408", "type": "seen", "source": "https://t.me/CveExploits/14", "content": "\ud83d\udea8 CVE-2023-3408\nThe Bricks theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.1. This is due to missing or incorrect nonce validation on the 'save_settings' function. This makes it possible for unauthenticated attackers to modify the theme's settings, including enabling a setting which allows lower-privileged users such as contributors to perform code execution, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", "creation_timestamp": "2024-08-17T14:01:30.000000Z"}, {"uuid": "41978dd0-cfc8-477a-aa47-ef1d4097ea74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34086", "type": "seen", "source": "https://t.me/cibsecurity/68313", "content": "\u203c CVE-2023-34086 \u203c\n\nImproper input validation in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:32:31.000000Z"}, {"uuid": "9ba87fdb-40ed-4cc0-9782-c4e29e906e19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34088", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1049", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-34088\n\ud83d\udd39 Description: Collabora Online is a collaborative online office suite. A stored cross-site scripting (XSS) vulnerability was found in Collabora Online prior to versions 22.05.13, 21.11.9.1, and 6.4.27. An attacker could create a document with an XSS payload as a document name. Later, if an administrator opened the admin console and navigated to the history page, the document name was injected as unescaped HTML and executed as a script inside the context of the admin console. The administrator JSON web token (JWT) used for the websocket connection could be leaked through this flaw. Users should upgrade to Collabora Online 22.05.13 or higher; Collabora Online 21.11.9.1 or higher; Collabora Online 6.4.27 or higher to receive a patch.\n\ud83d\udccf Published: 2023-05-31T18:15:42.895Z\n\ud83d\udccf Modified: 2025-01-09T19:51:07.042Z\n\ud83d\udd17 References:\n1. https://github.com/CollaboraOnline/online/security/advisories/GHSA-7582-pwfh-3pwr", "creation_timestamp": "2025-01-09T20:16:23.000000Z"}, {"uuid": "5e2ff92c-877c-464a-a69b-7834aaa9f90b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34087", "type": "seen", "source": "https://t.me/ctinow/165615", "content": "https://ift.tt/CEVPaTH\nCVE-2023-34087 Exploit", "creation_timestamp": "2024-01-10T08:16:34.000000Z"}]}