{"vulnerability": "CVE-2023-4573", "sightings": [{"uuid": "c2f4de52-a48e-4673-bfc9-40d32d578384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45734", "type": "seen", "source": "https://t.me/ctinow/192624", "content": "https://ift.tt/qm9glP1\nCVE-2023-45734 | OpenHarmony up to 3.2.4/4.0.0 out-of-bounds write", "creation_timestamp": "2024-02-24T15:16:53.000000Z"}, {"uuid": "0cd93b46-a82a-4e15-a193-2676c81dc5c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45735", "type": "seen", "source": "https://t.me/ctinow/180401", "content": "https://ift.tt/7BekwOD\nCVE-2023-45735", "creation_timestamp": "2024-02-06T23:31:31.000000Z"}, {"uuid": "906150a5-a469-4301-92ba-1888a272174a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45737", "type": "seen", "source": "https://t.me/ctinow/159279", "content": "https://ift.tt/iQholHX\nCVE-2023-45737", "creation_timestamp": "2023-12-26T09:26:45.000000Z"}, {"uuid": "d5df2c1a-6da7-4836-9dad-84a5dd332af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4573", "type": "seen", "source": "https://t.me/cibsecurity/70193", "content": "\u203c CVE-2023-4573 \u203c\n\nWhen receiving rendering data over IPC `mStream` could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:07.000000Z"}, {"uuid": "d3716aeb-6f5f-43d7-aff5-76e1142c8612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45737", "type": "seen", "source": "https://t.me/ctinow/170128", "content": "https://ift.tt/bTn8yUp\nCVE-2023-45737 | WESEEK GROWI up to 3.4.x App Settings Page /admin/markdown cross site scripting", "creation_timestamp": "2024-01-19T10:16:39.000000Z"}, {"uuid": "73a67dfe-8a7c-4cb7-b20c-08815620f65f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45735", "type": "seen", "source": "https://t.me/ctinow/186901", "content": "https://ift.tt/dENYtwj\nCVE-2023-45735 | Westermo Lynx 206-F2G 4.24 code injection (icsa-24-023-04)", "creation_timestamp": "2024-02-17T12:41:38.000000Z"}, {"uuid": "837092cd-7ca3-463d-8b5f-3ba742058931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45734", "type": "seen", "source": "https://t.me/ctinow/177968", "content": "https://ift.tt/uxo6WNO\nCVE-2023-45734", "creation_timestamp": "2024-02-02T08:31:28.000000Z"}]}