{"vulnerability": "CVE-2023-2163", "sightings": [{"uuid": "eab1644e-e30a-4456-a2af-8a4c78f301ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/138", "content": "\u2604\ufe0fCVE-2023-2163: Linux Kernel eBPF verifier bug\n\n\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0432\u0435\u0440\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u0432 BPF \u0432 \u044f\u0434\u0440\u0435 Linux&gt;=5.4 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u043a \u043a\u043e\u0434\u0443 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043f\u043e\u043c\u0435\u0447\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u043c\u0443 \u0447\u0442\u0435\u043d\u0438\u044e/\u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u044f\u0434\u0440\u0430\ud83d\udd13\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/google/security-research/security/advisories/GHSA-j87x-j6mh-mv8v\n\n#cve #poc #exploit #linux", "creation_timestamp": "2023-10-18T05:13:30.000000Z"}, {"uuid": "aa7ae60e-0acd-43f3-b883-9c0690307c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "Telegram/JLs-YPTce5q8nJekl5KDC19Zi7GU47cBmF1ZKMmxpH2G", "content": "", "creation_timestamp": "2023-10-23T00:34:43.000000Z"}, {"uuid": "7defc270-ee3a-4d3d-93ea-4e6fc4a68a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6078", "content": "\u0412 \u0434\u043e\u0433\u043e\u043d\u043a\u0443 \u043a Cisco, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0438 \u0440\u044f\u0434 \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Claroty \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438  \u0434\u0432\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u041f\u041b\u041a \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Unitronics, \u0442\u043e\u0439 \u0441\u0430\u043c\u043e\u0439, \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0438\u0440\u0430\u043d\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Cyber Av3ngers. \u041e\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b.\n\nJenkins \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u0434\u0432\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u0440\u043e\u0435\u043a\u0442\u0430.\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Progress, \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0434\u043e\u0441\u0442\u0430\u043b\u043e\u0441\u044c \u0440\u0435\u0448\u0435\u043d\u0438\u044e \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0438 WhatsUp Gold.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shadowserver Foundation, \u0430\u0442\u0430\u043a\u0438 \u043d\u0430\u0447\u0430\u043b\u0438\u0441\u044c \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 \u0438 \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u044b \u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (CVE-2024-4885), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u0438\u044e\u043d\u044f. \n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438 PoC \u0431\u044b\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u0438\u044e\u043b\u044f.\n\n1Password \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 CVE-2024-42219 \u0432 \u0441\u0432\u043e\u0435\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u0434\u043b\u044f macOS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u043c \u0432\u044b\u0434\u0430\u0432\u0430\u0442\u044c \u0441\u0435\u0431\u044f \u0437\u0430 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 1Password \u0438 \u043a\u0440\u0430\u0441\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0438\u0437 \u0435\u0433\u043e \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430.\n\nGoogle \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435\u00a0\u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0434\u043b\u044f CVE-2023-2163 - \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u044f\u0434\u0440\u0430 Linux eBPF, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f LPE \u0438 \u0430\u0442\u0430\u043a \u0441 \u0446\u0435\u043b\u044c\u044e \u0432\u044b\u0445\u043e\u0434\u0430 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430.\n\nSonos \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0443\u043c\u043d\u044b\u0445 \u043a\u043e\u043b\u043e\u043d\u043a\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 CVE-2023-50809.\n\n\u041e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0437\u043e\u043d\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f Wi-Fi \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0441\u043c\u0430\u0440\u0442-\u0434\u0438\u043d\u0430\u043c\u0438\u043a\u0430 Sonos, \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0441\u043a\u0440\u044b\u0442\u043d\u043e \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0437\u0432\u0443\u043a.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 NCC Group \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0441 \u0432\u0438\u0434\u0435\u043e, \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0449\u0438\u043c \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u043e\u043a\u0440\u0443\u0436\u0430\u044e\u0449\u0435\u0433\u043e \u0437\u0432\u0443\u043a\u0430.", "creation_timestamp": "2024-08-09T16:50:05.000000Z"}, {"uuid": "97702a47-ad13-47bd-9a04-3cf9f90f96a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "seen", "source": "https://t.me/cibsecurity/70779", "content": "\u203c CVE-2023-2163 \u203c\n\nIncorrect verifier pruning\u00c2\u00a0in BPF in Linux Kernel\u00c2\u00a0&gt;=5.4\u00c2\u00a0leads to unsafecode paths being incorrectly marked as safe, resulting in\u00c2\u00a0arbitrary read/write inkernel memory, lateral privilege escalation, and container escape.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-20T12:30:03.000000Z"}, {"uuid": "45adf1f7-369c-43ad-8710-39ec3e745897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21635", "type": "seen", "source": "https://t.me/cibsecurity/65930", "content": "\u203c CVE-2023-21635 \u203c\n\nMemory Corruption in Data Network Stack &amp; Connectivity when sim gets detected on telephony.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:25.000000Z"}, {"uuid": "e9cbadcb-2ecb-4595-9f3c-9d9489fd7717", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "seen", "source": "https://t.me/thebugbountyhunter/9008", "content": "Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability\n\nhttps://bughunters.google.com/blog/6303226026131456/a-deep-dive-into-cve-2023-2163-how-we-found-and-fixed-an-ebpf-linux-kernel-vulnerability", "creation_timestamp": "2024-08-09T07:14:10.000000Z"}, {"uuid": "5b143e0c-fb96-4bd3-8b8b-66c211bd4537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1381", "content": "#exploit\n1. CVE-2023-2163:\nLinux Kernel: eBPF verifier bug\nhttps://github.com/google/security-research/security/advisories/GHSA-j87x-j6mh-mv8v\n\n2. CVE-2023-41993:\nApple WebKit Code Execution Vulnerability\nhttps://github.com/po6ix/POC-for-CVE-2023-41993\n\n3. CVE-2023-45603:\nWordpress Unauthenticated Arbitrary File Upload/Exploit\nhttps://github.com/codeb0ss/CVE-2023-45603-PoC", "creation_timestamp": "2024-08-16T08:33:57.000000Z"}, {"uuid": "9016455a-1a00-4676-b47d-8c89bc2ffc7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/196", "content": "\u2604\ufe0fCVE-2023-2163: Linux Kernel eBPF verifier bug\n\n\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0432\u0435\u0440\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u0432 BPF \u0432 \u044f\u0434\u0440\u0435 Linux&gt;=5.4 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u043a \u043a\u043e\u0434\u0443 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043f\u043e\u043c\u0435\u0447\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u043c\u0443 \u0447\u0442\u0435\u043d\u0438\u044e/\u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u044f\u0434\u0440\u0430\ud83d\udd13\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/google/security-research/security/advisories/GHSA-j87x-j6mh-mv8v\n\n#cve #poc #exploit #linux", "creation_timestamp": "2023-10-18T05:13:30.000000Z"}, {"uuid": "0a91d9ba-8c5b-4612-aa60-6caf22457340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/221514", "content": "A Deep Dive Into CVE-2023-2163: How Google Found And Fixed An eBPF Linux Kernel Vulnerability\nhttps://ift.tt/0ZbytnH", "creation_timestamp": "2024-08-08T16:54:34.000000Z"}, {"uuid": "bf6a6332-7589-44af-87e7-a6f5923c3644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21633", "type": "seen", "source": "https://t.me/cibsecurity/65936", "content": "\u203c CVE-2023-21633 \u203c\n\nMemory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:33.000000Z"}, {"uuid": "257293a4-d76b-472e-bbc4-cd6660a42c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9208", "content": "#exploit\n1. CVE-2023-2163:\nLinux Kernel: eBPF verifier bug\nhttps://github.com/google/security-research/security/advisories/GHSA-j87x-j6mh-mv8v\n\n2. CVE-2023-41993:\nApple WebKit Code Execution Vulnerability\nhttps://github.com/po6ix/POC-for-CVE-2023-41993\n\n3. CVE-2023-45603:\nWordpress Unauthenticated Arbitrary File Upload/Exploit\nhttps://github.com/codeb0ss/CVE-2023-45603-PoC", "creation_timestamp": "2023-10-16T12:20:37.000000Z"}, {"uuid": "df790e91-58b3-4cda-abc4-33b5cafe2bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly226qugix24", "content": "", "creation_timestamp": "2025-09-04T21:02:23.875782Z"}, {"uuid": "3db5b01b-3ce2-4012-ac30-7655b8ec85f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/261", "content": "A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability\n\nAn article by JJ and Meador Inge about exploiting a bug in the eBPF subsystem found with buzzer.", "creation_timestamp": "2024-08-10T00:54:47.000000Z"}, {"uuid": "34d3c725-503b-481e-860f-be296bc36dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2163", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1782", "content": "CVE-2023-2163\nLinux Kernel: eBPF verifier bug \nPOC", "creation_timestamp": "2023-10-17T12:15:52.000000Z"}, {"uuid": "52f78838-0f93-4824-b4ac-65d9c2550373", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21634", "type": "seen", "source": "https://t.me/ctinow/158841", "content": "https://ift.tt/L5tY1aj\nCVE-2023-21634 | Qualcomm 835 Mobile PC Platform Radio Interface Layer memory corruption", "creation_timestamp": "2023-12-23T15:21:57.000000Z"}, {"uuid": "9765aea9-ffcb-4a40-85fd-a838bb152508", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21639", "type": "seen", "source": "https://t.me/cibsecurity/65929", "content": "\u203c CVE-2023-21639 \u203c\n\nMemory corruption in Audio while processing sva_model_serializer using memory size passed by HIDL client.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:24.000000Z"}]}