{"vulnerability": "cve-2023-5000", "sightings": [{"uuid": "6e4eaeb0-c352-485c-8965-80bc6247d9b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50008", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17873", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50008\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: FFmpeg v.n6.1-3-g466799d4f5 allows memory consumption when using the colorcorrect filter, in the av_malloc function in libavutil/mem.c:105:9 component.\n\ud83d\udccf Published: 2024-04-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-10T13:26:02.428Z\n\ud83d\udd17 References:\n1. https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b\n2. https://trac.ffmpeg.org/ticket/10701\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/\n5. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", "creation_timestamp": "2025-06-10T13:30:00.000000Z"}, {"uuid": "e2984b63-6e55-46d3-b7a7-da5c0c6224ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5000", "type": "seen", "source": "https://t.me/cvedetector/2512", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-5000 - WordPress Horizontal Scrolling Announcements Plugin SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-5000 \nPublished : Aug. 6, 2024, 2:15 a.m. | 41\u00a0minutes ago \nDescription : The Horizontal scrolling announcements plugin for WordPress is vulnerable to SQL Injection via the plugin's 'hsas-shortcode' shortcode in versions up to, and including, 2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T04:58:04.000000Z"}, {"uuid": "1d5db2b7-3bc9-4f6f-b79f-0ffae648aa58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50002", "type": "seen", "source": "https://t.me/ctinow/161001", "content": "https://ift.tt/jsB2fX1\nCVE-2023-50002 | Tenda W30E 16.01.0.12(4843) formRebootMeshNode stack-based overflow", "creation_timestamp": "2023-12-31T08:16:25.000000Z"}, {"uuid": "d4b0933d-b497-41a3-9394-353e92dec886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50001", "type": "seen", "source": "https://t.me/ctinow/160999", "content": "https://ift.tt/UrX2xYA\nCVE-2023-50001 | Tenda W30E 16.01.0.12(4843) formUpgradeMeshOnline stack-based overflow", "creation_timestamp": "2023-12-31T07:46:40.000000Z"}, {"uuid": "fd85d841-7378-4541-a124-e2cb38bd4fb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50000", "type": "seen", "source": "https://t.me/ctinow/160998", "content": "https://ift.tt/nqfjXBU\nCVE-2023-50000 | Tenda W30E 16.01.0.12(4843) formResetMeshNode stack-based overflow", "creation_timestamp": "2023-12-31T07:46:38.000000Z"}]}