{"vulnerability": "CVE-2023-2124", "sightings": [{"uuid": "bafd454a-e569-4ab4-9f00-147ab9c07a0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21244", "type": "seen", "source": "https://t.me/cibsecurity/71756", "content": "\u203c CVE-2023-21244 \u203c\n\nIn visitUris of Notification.java, there is a possible bypass of user profile boundaries due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-06T22:13:44.000000Z"}, {"uuid": "17889b6c-b3bb-4ce3-ba61-10eba29dd5d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21242", "type": "seen", "source": "https://t.me/cibsecurity/68496", "content": "\u203c CVE-2023-21242 \u203c\n\nIn isServerCertChainValid of InsecureEapNetworkHandler.java, there is a possible way to trust an imposter server due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T00:20:02.000000Z"}, {"uuid": "8aefcf0a-cc6d-4e8e-9dce-363456b289e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21240", "type": "seen", "source": "https://t.me/cibsecurity/66611", "content": "\u203c CVE-2023-21240 \u203c\n\nIn Policy of Policy.java, there is a possible boot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T07:42:13.000000Z"}, {"uuid": "c542a2d7-5a95-41a0-b3ec-0f0b738e1b9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21249", "type": "seen", "source": "https://t.me/cibsecurity/66615", "content": "\u203c CVE-2023-21249 \u203c\n\nIn multiple functions of OneTimePermissionUserManager.java, there is a possible one-time permission retention due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T07:42:20.000000Z"}, {"uuid": "cdd8c016-77f6-4458-802f-cc7b9d863cc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2124", "type": "seen", "source": "https://t.me/cibsecurity/64185", "content": "\u203c CVE-2023-2124 \u203c\n\nAn out-of-bounds memory access flaw was found in the Linux kernel\u00e2\u20ac\u2122s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-16T02:30:06.000000Z"}]}