{"vulnerability": "cve-2023-5006", "sightings": [{"uuid": "d0f4b797-e893-4def-b573-0e308f3cc656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/198377", "content": "https://ift.tt/XCIWFRz\nCVE-2023-50061 | Op'art Easy Redirect Module 1.3.8/1.3.9/1.3.10/1.3.11/1.3.12 on PrestaShop hookActionDispatcher sql injection", "creation_timestamp": "2024-03-02T14:46:46.000000Z"}, {"uuid": "dcb69d7b-f0e3-45e7-b09f-e30fb526c341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18104", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-5006\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Discord Invite WordPress plugin before 2.5.1 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to perform actions on their behalf by tricking a logged in administrator to submit a crafted request.\n\ud83d\udccf Published: 2024-01-17T14:31:48.144Z\n\ud83d\udccf Modified: 2025-06-11T17:04:46.980Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8", "creation_timestamp": "2025-06-11T17:34:33.000000Z"}, {"uuid": "8e48645e-fc0e-484e-ae8b-0c914872ba7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/173082", "content": "https://ift.tt/g3AsmDx\nCVE-2023-5006 Exploit", "creation_timestamp": "2024-01-24T21:16:21.000000Z"}, {"uuid": "3b411fcd-5b76-4491-83a0-bfdca4ce0110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/160699", "content": "https://ift.tt/mO1ku3h\nCVE-2023-50069", "creation_timestamp": "2023-12-29T22:26:54.000000Z"}, {"uuid": "35c4aab6-58bb-4e67-8a4b-200f3ae501a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/163809", "content": "https://ift.tt/lB6rSz3\nCVE-2023-50069 Exploit", "creation_timestamp": "2024-01-06T04:16:14.000000Z"}, {"uuid": "b7847ac9-1a43-4ab6-82f5-24672430cee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/cibsecurity/74007", "content": "\u203c\ufe0fCVE-2023-50069\u203c\ufe0f\n\nWireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored crosssite scripting SXSS through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:43:27.000000Z"}, {"uuid": "f37012f4-7ff6-4356-b058-f950fcba78b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50061", "type": "seen", "source": "https://t.me/ctinow/181570", "content": "https://ift.tt/sKHxO4p\nCVE-2023-50061", "creation_timestamp": "2024-02-08T19:22:21.000000Z"}, {"uuid": "d848001e-bab7-45b3-b05a-f92752d06815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50069", "type": "seen", "source": "https://t.me/ctinow/170900", "content": "https://ift.tt/IMbFUDE\nCVE-2023-50069 | WireMock up to 3.2.0.0 cross site scripting (Issue 51)", "creation_timestamp": "2024-01-21T18:46:36.000000Z"}, {"uuid": "29a726eb-990e-4feb-b559-238201a3a5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5006", "type": "seen", "source": "https://t.me/ctinow/169328", "content": "https://ift.tt/sGjvB9a\nCVE-2023-5006", "creation_timestamp": "2024-01-17T16:26:26.000000Z"}]}