{"vulnerability": "cve-2023-5211", "sightings": [{"uuid": "d023180e-97a0-43cf-b464-4b0327ace53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52119", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17418", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52119\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Icegram Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building.This issue affects Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building: from n/a through 3.1.18.\n\n\n\ud83d\udccf Published: 2024-01-05T09:28:10.115Z\n\ud83d\udccf Modified: 2025-05-23T16:03:25.681Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-engage-plugin-3-1-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-23T16:46:01.000000Z"}, {"uuid": "12126801-9432-47e4-a4fb-6ee452551eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18304", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions.\n\ud83d\udccf Published: 2024-01-16T08:22:31.324Z\n\ud83d\udccf Modified: 2025-06-13T16:10:42.713Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-13T16:37:06.000000Z"}, {"uuid": "b0fac721-ef92-4135-96df-143ec5716047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52110", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19019", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52110\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2024-01-16T07:54:39.422Z\n\ud83d\udccf Modified: 2025-06-20T17:18:42.847Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:39.000000Z"}, {"uuid": "e81867e3-568e-4fb7-850d-11e429a2cefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19018", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52112\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2024-01-16T07:57:06.023Z\n\ud83d\udccf Modified: 2025-06-20T17:19:28.707Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:38.000000Z"}, {"uuid": "b70554e5-cb59-4cf9-8efe-af4c4b64fafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19017", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52113\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability.\n\ud83d\udccf Published: 2024-01-16T07:58:43.439Z\n\ud83d\udccf Modified: 2025-06-20T17:20:27.978Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:37.000000Z"}, {"uuid": "c1f7f180-6712-4717-a832-c925e3a9e88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52118", "type": "seen", "source": "https://t.me/ctinow/192464", "content": "https://ift.tt/BvFUC6A\nCVE-2023-52118 | WP Event Manager WP User Profile Avatar Plugin up to 1.0 on WordPress cross site scripting", "creation_timestamp": "2024-02-24T08:11:10.000000Z"}, {"uuid": "ec05417e-01cd-44e1-bb61-d942f7df728c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5211", "type": "seen", "source": "https://t.me/cibsecurity/73234", "content": "\u203c CVE-2023-5211 \u203c\n\nThe Fattura24 WordPress plugin before 6.2.8 does not sanitize or escape the 'id' parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T17:21:04.000000Z"}, {"uuid": "db945506-ec3e-43cb-a9ae-086c4142f3b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52118", "type": "seen", "source": "https://t.me/ctinow/177534", "content": "https://ift.tt/B5tAfze\nCVE-2023-52118", "creation_timestamp": "2024-02-01T12:36:32.000000Z"}, {"uuid": "d9497497-978f-4b37-b191-8c2d30f3d9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52116", "type": "seen", "source": "https://t.me/ctinow/178650", "content": "https://ift.tt/P1DVlgI\nCVE-2023-52116 | Huawei HarmonyOS/EMUI Multi-Screen Interaction Module privileges management", "creation_timestamp": "2024-02-03T21:56:31.000000Z"}, {"uuid": "ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/ctinow/178649", "content": "https://ift.tt/7dE8tZa\nCVE-2023-52115 | Huawei HarmonyOS 4.0.0 iAware Module use after free", "creation_timestamp": "2024-02-03T21:56:30.000000Z"}, {"uuid": "f2c83d1f-dd24-400e-bf0f-1b076074f8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52114", "type": "seen", "source": "https://t.me/ctinow/178647", "content": "https://ift.tt/1pQ4G5o\nCVE-2023-52114 | Huawei HarmonyOS/EMUI ScreenReader Module access control", "creation_timestamp": "2024-02-03T21:26:53.000000Z"}, {"uuid": "7ec661a9-f057-46b2-bf34-2a8df40a83b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/ctinow/178646", "content": "https://ift.tt/FoPC2Mm\nCVE-2023-52112 | Huawei HarmonyOS/EMUI Wallpaper Service Module access control", "creation_timestamp": "2024-02-03T21:26:52.000000Z"}, {"uuid": "722aa45e-65a5-4193-8db9-4a15d9815865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52111", "type": "seen", "source": "https://t.me/ctinow/178645", "content": "https://ift.tt/3zindZX\nCVE-2023-52111 | Huawei HarmonyOS/EMUI BootLoader Module improper authentication", "creation_timestamp": "2024-02-03T21:26:51.000000Z"}, {"uuid": "6b0e0637-5e24-4e9b-840e-8ba619e67bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52110", "type": "seen", "source": "https://t.me/ctinow/178643", "content": "https://ift.tt/1KbiJah\nCVE-2023-52110 | Huawei HarmonyOS 4.0.0 Sensor Module out-of-bounds", "creation_timestamp": "2024-02-03T20:56:27.000000Z"}, {"uuid": "b9e85238-b9f1-4307-aadf-2552f7c9570e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52113", "type": "seen", "source": "https://t.me/ctinow/178641", "content": "https://ift.tt/5w1JuIH\nCVE-2023-52113 | Huawei HarmonyOS/EMUI ActivityManagerService Module denial of service", "creation_timestamp": "2024-02-03T20:56:24.000000Z"}, {"uuid": "93fc2f97-3c81-4c4e-b6c5-6fa9dc69fbeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52119", "type": "seen", "source": "https://t.me/ctinow/172649", "content": "https://ift.tt/c1NAV2r\nCVE-2023-52119 | Icegram Engage Plugin up to 3.1.18 on WordPress cross-site request forgery", "creation_timestamp": "2024-01-24T10:36:18.000000Z"}, {"uuid": "1c8d7a71-93a4-4bfc-bc15-241c1beca98f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52119", "type": "seen", "source": "https://t.me/ctinow/163476", "content": "https://ift.tt/WXE8vRo\nCVE-2023-52119", "creation_timestamp": "2024-01-05T11:31:58.000000Z"}]}