{"vulnerability": "CVE-2023-2121", "sightings": [{"uuid": "675cd801-3c94-470b-aeba-a7b5564eb28c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21218", "type": "seen", "source": "https://t.me/ctinow/158962", "content": "https://ift.tt/cfAyE6V\nCVE-2023-21218 | Google Android Privilege Escalation", "creation_timestamp": "2023-12-24T09:41:13.000000Z"}, {"uuid": "5e07df26-96c7-4c5a-b97a-40abaef50ea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21216", "type": "seen", "source": "https://t.me/ctinow/158958", "content": "https://ift.tt/bfHOlSx\nCVE-2023-21216 | Google Android Privilege Escalation", "creation_timestamp": "2023-12-24T09:41:08.000000Z"}, {"uuid": "65a4e061-f0aa-4391-a4cb-1561a00421c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2121", "type": "seen", "source": "https://t.me/cibsecurity/65108", "content": "\u203c CVE-2023-2121 \u203c\n\nVault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-09T20:21:53.000000Z"}, {"uuid": "73abea77-04d2-4fab-be98-46aca2ca4c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21212", "type": "seen", "source": "https://t.me/cibsecurity/65675", "content": "\u203c CVE-2023-21212 \u203c\n\nIn multiple files, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236031\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T22:19:36.000000Z"}, {"uuid": "6ba7085d-151c-4a9c-ae6f-eabb8d01974f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21213", "type": "seen", "source": "https://t.me/cibsecurity/65661", "content": "\u203c CVE-2023-21213 \u203c\n\nIn initiateTdlsTeardownInternal of sta_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235951\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T22:19:13.000000Z"}, {"uuid": "17b2e9b8-eb4e-43bc-be70-263f71012124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21215", "type": "seen", "source": "https://t.me/ctinow/158954", "content": "https://ift.tt/QMPAnry\nCVE-2023-21215 | Google Android Privilege Escalation", "creation_timestamp": "2023-12-24T08:41:42.000000Z"}, {"uuid": "4315ffaf-a98a-4105-86b8-ec4fe84591f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21217", "type": "seen", "source": "https://t.me/ctinow/158961", "content": "https://ift.tt/Giozg8q\nCVE-2023-21217 | Google Android Privilege Escalation", "creation_timestamp": "2023-12-24T09:41:12.000000Z"}, {"uuid": "88661a5f-49dc-467f-a10f-0d2f0fad2d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21211", "type": "seen", "source": "https://t.me/cibsecurity/65659", "content": "\u203c CVE-2023-21211 \u203c\n\nIn multiple files, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235998\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T22:19:11.000000Z"}, {"uuid": "686c299e-6afe-4692-8efa-4ce305a341b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21210", "type": "seen", "source": "https://t.me/cibsecurity/65658", "content": "\u203c CVE-2023-21210 \u203c\n\nIn initiateHs20IconQueryInternal of sta_iface.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236331\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T22:19:10.000000Z"}, {"uuid": "cb9584e8-9ee1-4c4f-86ab-222e48f6282e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21214", "type": "seen", "source": "https://t.me/cibsecurity/65657", "content": "\u203c CVE-2023-21214 \u203c\n\nIn addGroupWithConfigInternal of p2p_iface.cpp, there is a possible out of bounds read due to unsafe deserialization. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235736\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T22:13:35.000000Z"}]}