{"vulnerability": "CVE-2023-4504", "sightings": [{"uuid": "74230e96-89b7-4a18-b9d8-0b9e343bc4ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45045", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758678617440184", "content": "", "creation_timestamp": "2025-01-02T12:08:01.672662Z"}, {"uuid": "53b42116-f579-4e22-a551-b39447e781a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45045", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2jecogp2m", "content": "", "creation_timestamp": "2025-01-02T12:15:37.464564Z"}, {"uuid": "62e35d77-9a11-4413-9b90-06b7504c6d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4504", "type": "seen", "source": "http://takeonme.org/cves/cve-2023-4504/", "content": "", "creation_timestamp": "2023-09-21T16:37:00.000000Z"}, {"uuid": "5798d8a0-16b8-458f-b469-00720a9839bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4504", "type": "seen", "source": "http://takeonme.org/cve/", "content": "", "creation_timestamp": "2000-12-31T23:00:00.000000Z"}, {"uuid": "64f4b3db-6619-47c4-b4f5-63b0eb3744c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45045", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/220", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45045\n\ud83d\udd39 Description: Missing Authorization vulnerability in Kishor Khambu WP Custom Widget area allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Custom Widget area: from n/a through 1.2.5.\n\ud83d\udccf Published: 2025-01-02T11:59:47.939Z\n\ud83d\udccf Modified: 2025-01-06T20:23:39.820Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-custom-widget-area/vulnerability/wordpress-wp-custom-widget-area-plugin-1-2-5-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-06T20:49:30.000000Z"}, {"uuid": "c26900ad-d95c-4b55-83a9-6acb5519b742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4504", "type": "seen", "source": "https://t.me/arpsyndicate/263", "content": "#ExploitObserverAlert\n\nCVE-2023-4504\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-4504. Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.\n\nFIRST-EPSS: 0.001030000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2023-11-19T14:26:27.000000Z"}, {"uuid": "06282c52-006b-44f2-ae3e-8b7777cb91bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4504", "type": "seen", "source": "Telegram/bEKuRqlCK0SjL5SIdOg-jUTwUQfnG5wD1cKXAMtLzyK_pOEg", "content": "", "creation_timestamp": "2025-02-14T10:08:17.000000Z"}, {"uuid": "e551abd7-d023-4ad6-a301-19f8318e10e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45048", "type": "seen", "source": "https://t.me/cibsecurity/72171", "content": "\u203c CVE-2023-45048 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin &lt;=\u00c2\u00a05.00 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-12T16:23:12.000000Z"}, {"uuid": "3d5cbad7-7604-46de-a63e-051c40b3b106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45042", "type": "seen", "source": "https://t.me/ctinow/172819", "content": "https://ift.tt/qyktJOE\nCVE-2023-45042 | QNAP QuTS hero/QTS prior 5.1.4.2596 Build 20231128 buffer overflow (qsa-23-27)", "creation_timestamp": "2024-01-24T15:16:29.000000Z"}, {"uuid": "8c49b3a0-0a9c-4e55-a025-67c026e0cebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45049", "type": "seen", "source": "https://t.me/cibsecurity/72500", "content": "\u203c CVE-2023-45049 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ciprian Popescu YouTube Playlist Player plugin &lt;=\u00c2\u00a04.6.7 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T12:49:48.000000Z"}, {"uuid": "e850ef71-6ad0-48d5-9b7d-4ca36c32d628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45044", "type": "seen", "source": "https://t.me/ctinow/172821", "content": "https://ift.tt/GMwDSry\nCVE-2023-45044 | QNAP QuTS hero/QTS prior 5.1.4.2596 Build 20231128 buffer overflow (qsa-23-27)", "creation_timestamp": "2024-01-24T15:16:31.000000Z"}, {"uuid": "eef7ea4d-54c0-4a01-a6f6-071c675bdb11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45043", "type": "seen", "source": "https://t.me/ctinow/172820", "content": "https://ift.tt/GEhI4eD\nCVE-2023-45043 | QNAP QuTS hero/QTS prior 5.1.4.2596 Build 20231128 buffer overflow (qsa-23-27)", "creation_timestamp": "2024-01-24T15:16:30.000000Z"}, {"uuid": "ade5ce8d-f811-4929-b972-2fc3d472a914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45041", "type": "seen", "source": "https://t.me/ctinow/172799", "content": "https://ift.tt/zbfK7xR\nCVE-2023-45041 | QNAP QuTS hero/QTS prior 5.1.4.2596 Build 20231128 Administrator buffer overflow (qsa-23-27)", "creation_timestamp": "2024-01-24T14:47:07.000000Z"}, {"uuid": "53b4832b-4f0e-4796-9515-315ea57bd2db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45040", "type": "seen", "source": "https://t.me/ctinow/172798", "content": "https://ift.tt/4M5Lw38\nCVE-2023-45040 | QNAP Systems QTS/QuTS hero prior 5.1.4.2596 Build 20231128 buffer overflow (qsa-23-27)", "creation_timestamp": "2024-01-24T14:47:06.000000Z"}, {"uuid": "e8fe3398-5e41-4900-bbf1-74a3f0c60852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4504", "type": "seen", "source": "https://t.me/cibsecurity/70932", "content": "\u203c CVE-2023-4504 \u203c\n\nDue to failure in validating the length provided by an attacker-crafted PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-22T02:45:00.000000Z"}]}