{"vulnerability": "cve-2023-2701", "sightings": [{"uuid": "d309112c-df6c-489e-900a-e3691bce6663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27015", "type": "seen", "source": "Telegram/TzZaJ2iW0TPTDsMBb3CPyz1zWYZ-mqEHTIQQ8jPi9uA4JXXE", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}, {"uuid": "d9cfbcb3-6663-42aa-9095-63eea291d9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27014", "type": "seen", "source": "Telegram/bqW1OtssH0_6EKpCgn9HzhryrFaFAEjb6quxNe8OLIohZiUq", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}, {"uuid": "5f41fdf1-93a3-47f3-b5a6-81135d317305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "Telegram/oi9pEo4KGGyZPVX_mB9XSRpABw0G6yyvQG1vw7Vw34XYS7cY", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}, {"uuid": "3fd001b6-3647-4d84-98de-2b9e56644aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27012", "type": "seen", "source": "Telegram/YPd9jOc1W5QBJWC4avKUZMxMcGEJ1YmZAhAcR_Lo5OO4fhXc", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}, {"uuid": "2e1a08df-7101-4383-b259-ecae1bc096ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27019", "type": "seen", "source": "Telegram/5hH5ajtM-oZI8EMttLkpzze1UyaglwRFKGyZ2ZBcuYombhG4", "content": "", "creation_timestamp": "2025-02-14T10:05:08.000000Z"}, {"uuid": "482aabc9-4f85-4218-8ac1-d32ef49aee78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "Telegram/ib8gY-Q5HRQUW41-2rJMx_KFZDsIdvLiY1NF5C54imovq6U4", "content": "", "creation_timestamp": "2025-02-14T10:05:59.000000Z"}, {"uuid": "30019dea-6529-4676-b008-0c97a5f77a18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2701", "type": "seen", "source": "https://t.me/cibsecurity/66818", "content": "\u203c CVE-2023-2701 \u203c\n\nThe Gravity Forms WordPress plugin before 2.7.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:15.000000Z"}, {"uuid": "ca5c01e5-ceb4-4c9a-8249-2109df599fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "https://t.me/cibsecurity/61637", "content": "\u203c CVE-2023-27016 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:10.000000Z"}, {"uuid": "5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "https://t.me/cibsecurity/61636", "content": "\u203c CVE-2023-27013 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:09.000000Z"}, {"uuid": "daa5fbcd-df93-48b3-bc06-93ac5d5d3c72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27018", "type": "seen", "source": "https://t.me/cibsecurity/61632", "content": "\u203c CVE-2023-27018 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_45EC1C function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:02.000000Z"}, {"uuid": "507303da-6756-4d69-a2ce-431809af4793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27019", "type": "seen", "source": "https://t.me/cibsecurity/61635", "content": "\u203c CVE-2023-27019 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_458FBC function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:08.000000Z"}, {"uuid": "1e4071cb-c438-4192-8654-b6db2e9e945e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27015", "type": "seen", "source": "https://t.me/cibsecurity/61630", "content": "\u203c CVE-2023-27015 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_4A75C0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:01.000000Z"}, {"uuid": "448152dc-ed46-4b6b-a423-626594abb299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27014", "type": "seen", "source": "https://t.me/cibsecurity/61629", "content": "\u203c CVE-2023-27014 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_46AC38 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:26:59.000000Z"}, {"uuid": "f3305c4c-b9c7-4007-8e0a-47d31ca76de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27017", "type": "seen", "source": "https://t.me/cibsecurity/61640", "content": "\u203c CVE-2023-27017 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_45DC58 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:16.000000Z"}, {"uuid": "3013bd85-d5eb-403a-9210-f87599b510b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27010", "type": "seen", "source": "https://t.me/cibsecurity/59926", "content": "\u203c CVE-2023-27010 \u203c\n\nWondershare Dr.Fone v12.9.6 was discovered to contain weak permissions for the service WsDrvInst. This vulnerability allows attackers to escalate privileges via modifying or overwriting the executable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-13T21:53:26.000000Z"}]}