CVE-2023-21410 – Non-sanitized user input could lead to arbitrary code execution in AXIS License Plate Verifier
https://notcve.org/view.php?id=CVE-2023-21410
User provided input is not sanitized on the AXIS License Plate Verifier specific “api.cgi” allowing for arbitrary code execution. • https://www.axis.com/dam/public/0b/1c/96/cve-2023-2140712-en-US-409778.pdf •
CVE-2023-38748
https://notcve.org/view.php?id=CVE-2023-38748
By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. • https://jvn.jp/en/vu/JVNVU93286117 https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf • CWE-416: Use After Free •
CVE-2023-38747
https://notcve.org/view.php?id=CVE-2023-38747
By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. • https://jvn.jp/en/vu/JVNVU93286117 https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf • CWE-787: Out-of-bounds Write •
CVE-2023-38746
https://notcve.org/view.php?id=CVE-2023-38746
By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. • https://jvn.jp/en/vu/JVNVU93286117 https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf • CWE-125: Out-of-bounds Read •
CVE-2023-39157 – WordPress JetElements For Elementor Plugin <= 2.6.10 is vulnerable to Remote Code Execution (RCE)
https://notcve.org/view.php?id=CVE-2023-39157
Improper Control of Generation of Code ('Code Injection') vulnerability in Crocoblock JetElements For Elementor.This issue affects JetElements For Elementor: from n/a through 2.6.10. • https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-10-authenticated-remote-code-execution-rce-vulnerability?_s_id=cve • CWE-94: Improper Control of Generation of Code ('Code Injection') •