Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yahoo
Yahoo messenger |
|
| CPEs | cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yahoo
Yahoo messenger |
Fri, 30 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:inbit:inbit_messenger:*:*:*:*:*:*:*:* |
Wed, 14 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inbit
Inbit inbit Messenger |
|
| Vendors & Products |
Inbit
Inbit inbit Messenger |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges. | |
| Title | Inbit Messenger 4.9.0 - Unauthenticated Remote Command Execution (RCE) | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:29:40.439Z
Reserved: 2026-01-10T01:51:52.983Z
Link: CVE-2023-54329
Updated: 2026-01-14T15:47:42.533Z
Status : Analyzed
Published: 2026-01-13T23:15:59.970
Modified: 2026-01-30T15:47:32.033
Link: CVE-2023-54329
No data.
OpenCVE Enrichment
Updated: 2026-01-14T10:49:05Z