{"vulnerability": "cve-2023-4579", "sightings": [{"uuid": "5e6c020b-baef-410a-a44e-9475b88725c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4579", "type": "seen", "source": "https://t.me/cibsecurity/70196", "content": "\u203c CVE-2023-4579 \u203c\n\nSearch queries in the default search engine could appear to have been the currently navigated URL if the search query itself was a well formed URL. This could have led to a site spoofing another if it had been maliciously set as the default search engine. This vulnerability affects Firefox &lt; 117.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:10.000000Z"}, {"uuid": "a35d0dbc-7ac1-4559-ac4f-a391c65954ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45793", "type": "seen", "source": "https://t.me/ctinow/205605", "content": "https://ift.tt/iQV0Fe6\nCVE-2023-45793", "creation_timestamp": "2024-03-12T12:32:18.000000Z"}, {"uuid": "318b1b55-5507-4645-b825-f935dca4ff8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45798", "type": "seen", "source": "https://t.me/cibsecurity/73131", "content": "\u203c CVE-2023-45798 \u203c\n\nIn Yettiesoft VestCert versions 2.36 to 2.5.29, a vulnerability exists due to improper validation of third-party modules. This allows malicious actors to load arbitrary third-party modules, leading to remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-30T15:32:57.000000Z"}, {"uuid": "cb384c97-8aa9-4b28-848b-06383294ee25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45793", "type": "seen", "source": "https://t.me/ctinow/205592", "content": "https://ift.tt/iQV0Fe6\nCVE-2023-45793", "creation_timestamp": "2024-03-12T12:26:22.000000Z"}, {"uuid": "3496f4d6-ac15-4c82-9707-c1fda6321a20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45797", "type": "seen", "source": "https://t.me/cibsecurity/73126", "content": "\u203c CVE-2023-45797 \u203c\n\nA Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-30T15:30:11.000000Z"}, {"uuid": "e2016a48-ee20-49d5-b7e4-b4251353b9df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45799", "type": "seen", "source": "https://t.me/cibsecurity/73125", "content": "\u203c CVE-2023-45799 \u203c\n\nIn MLSoft TCO!stream versions 8.0.22.1115 and below, a vulnerability exists due to insufficient permission validation. This allows an attacker to make the victim download and execute arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-30T15:30:09.000000Z"}]}