Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2023-41592
Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.01
EPSS Ranking
76.0%
CVSS Severity
CVSS v3 Score
5.4
References
https://hacker.soarescorp.com/cve/2023-41592/
https://owasp.org/Top10/A03_2021-Injection/
https://owasp.org/www-project-top-ten/
https://hacker.soarescorp.com/cve/2023-41592/
https://owasp.org/Top10/A03_2021-Injection/
https://owasp.org/www-project-top-ten/
Products affected by CVE-2023-41592
Froala
»
Froala Editor
»
Version:
4.0.1
cpe:2.3:a:froala:froala_editor:4.0.1
Froala
»
Froala Editor
»
Version:
4.0.10
cpe:2.3:a:froala:froala_editor:4.0.10
Froala
»
Froala Editor
»
Version:
4.0.11
cpe:2.3:a:froala:froala_editor:4.0.11
Froala
»
Froala Editor
»
Version:
4.0.12
cpe:2.3:a:froala:froala_editor:4.0.12
Froala
»
Froala Editor
»
Version:
4.0.13
cpe:2.3:a:froala:froala_editor:4.0.13
Froala
»
Froala Editor
»
Version:
4.0.14
cpe:2.3:a:froala:froala_editor:4.0.14
Froala
»
Froala Editor
»
Version:
4.0.2
cpe:2.3:a:froala:froala_editor:4.0.2
Froala
»
Froala Editor
»
Version:
4.0.3
cpe:2.3:a:froala:froala_editor:4.0.3
Froala
»
Froala Editor
»
Version:
4.0.4
cpe:2.3:a:froala:froala_editor:4.0.4
Froala
»
Froala Editor
»
Version:
4.0.5
cpe:2.3:a:froala:froala_editor:4.0.5
Froala
»
Froala Editor
»
Version:
4.0.6
cpe:2.3:a:froala:froala_editor:4.0.6
Froala
»
Froala Editor
»
Version:
4.0.7
cpe:2.3:a:froala:froala_editor:4.0.7
Froala
»
Froala Editor
»
Version:
4.0.8
cpe:2.3:a:froala:froala_editor:4.0.8
Froala
»
Froala Editor
»
Version:
4.0.9
cpe:2.3:a:froala:froala_editor:4.0.9
Froala
»
Froala Editor
»
Version:
4.1.1
cpe:2.3:a:froala:froala_editor:4.1.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved