{"vulnerability": "CVE-2023-4527", "sightings": [{"uuid": "07a888cc-0494-4dc9-bb89-3f7435f5ba67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45271", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2jsauvt2e", "content": "", "creation_timestamp": "2025-01-02T12:15:52.042180Z"}, {"uuid": "1568b0a7-f023-4e2f-8a9b-17db2ec52aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45275", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2jufm232i", "content": "", "creation_timestamp": "2025-01-02T12:15:54.213360Z"}, {"uuid": "c98e427c-b40f-4e85-be8a-89fa0942a734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45271", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758796681231110", "content": "", "creation_timestamp": "2025-01-02T12:38:03.067288Z"}, {"uuid": "c03476a9-2e88-43d3-8a19-4d9bf73efb5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45275", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758796696349379", "content": "", "creation_timestamp": "2025-01-02T12:38:03.370770Z"}, {"uuid": "0900c846-81ff-45ae-a1c9-071ddb6e707a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45272", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerelqf5hz2c", "content": "", "creation_timestamp": "2025-01-02T15:15:57.045340Z"}, {"uuid": "58f88883-d146-4499-90e5-4bf215446c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45272", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lergww5qzd25", "content": "", "creation_timestamp": "2025-01-02T15:57:57.622008Z"}, {"uuid": "bbc1db57-6cb3-4851-82a0-a0774fa7c2a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4527", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "3c5d55ff-5b6e-4cff-8e17-013bab0ca5ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45277", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwrsq2s6hb2w", "content": "", "creation_timestamp": "2025-08-19T21:02:33.619778Z"}, {"uuid": "f636a8f1-201c-44ce-b33c-79a1402f5757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45272", "type": "seen", "source": "https://t.me/cvedetector/14167", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-45272 - 10Web Map Builder for Google Maps Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-45272 \nPublished : Jan. 2, 2025, 3:15 p.m. | 27\u00a0minutes ago \nDescription : Missing Authorization vulnerability in 10Web 10Web Map Builder for Google Maps allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 10Web Map Builder for Google Maps: from n/a through 1.0.73. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T16:46:13.000000Z"}, {"uuid": "3bb52250-a4ed-425c-a0a9-584713360e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45278", "type": "seen", "source": "https://t.me/cibsecurity/72588", "content": "\u203c CVE-2023-45278 \u203c\n\nDirectory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-19T20:34:31.000000Z"}, {"uuid": "281fdaa3-659a-4c15-a89c-1dbb1ceac9f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45273", "type": "seen", "source": "https://t.me/cibsecurity/72305", "content": "\u203c CVE-2023-45273 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Matt McKenny Stout Google Calendar plugin &lt;=\u00c2\u00a01.2.3 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-16T12:36:36.000000Z"}, {"uuid": "231ab53d-26fc-4e96-8eac-ed980b57ae22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45277", "type": "seen", "source": "https://t.me/cibsecurity/72587", "content": "\u203c CVE-2023-45277 \u203c\n\nYamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-19T20:34:30.000000Z"}, {"uuid": "c76b06fa-bebe-4e45-b89a-f5bec4a6e7c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45274", "type": "seen", "source": "https://t.me/cibsecurity/72306", "content": "\u203c CVE-2023-45274 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in SendPulse SendPulse Free Web Push plugin &lt;=\u00c2\u00a01.3.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T00:39:22.000000Z"}, {"uuid": "a475541d-747b-423d-bec7-c473f9c031c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45276", "type": "seen", "source": "https://t.me/cibsecurity/72270", "content": "\u203c CVE-2023-45276 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in automatededitor.Com Automated Editor plugin &lt;=\u00c2\u00a01.3 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-13T20:29:11.000000Z"}, {"uuid": "df9c79f5-36ff-4f51-9a01-0377e0a33592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45270", "type": "seen", "source": "https://t.me/cibsecurity/72268", "content": "\u203c CVE-2023-45270 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in PINPOINT.WORLD Pinpoint Booking System plugin &lt;=\u00c2\u00a02.9.9.4.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-13T20:29:09.000000Z"}, {"uuid": "6884d663-057c-434c-bf80-b2a7c045e8b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4527", "type": "seen", "source": "https://t.me/cibsecurity/70657", "content": "\u203c CVE-2023-4527 \u203c\n\nA flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-18T20:28:34.000000Z"}]}