{"vulnerability": "CVE-2023-3311", "sightings": [{"uuid": "0f5b53ac-1c58-4d25-b1f0-abc713c17afc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33110", "type": "seen", "source": "https://t.me/ctinow/171185", "content": "https://ift.tt/Y6qNQIi\nCVE-2023-33110 | Qualcomm 4 Gen 1 Mobile Platform PCM Host Voice Audio Driver race condition", "creation_timestamp": "2024-01-22T14:42:05.000000Z"}, {"uuid": "d004760b-b29a-491b-8a51-4f5637d7a43f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33114", "type": "seen", "source": "https://t.me/ctinow/171236", "content": "https://ift.tt/9ZyiF3Y\nCVE-2023-33114 | Qualcomm 315 5G IoT Modem NPU memory corruption", "creation_timestamp": "2024-01-22T15:41:30.000000Z"}, {"uuid": "159a3ab6-d38a-4dbc-960d-90fe3a0547bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33113", "type": "seen", "source": "https://t.me/ctinow/171235", "content": "https://ift.tt/BjtWwru\nCVE-2023-33113 | Qualcomm 4 Gen 1 Mobile Platform Resource Manager memory corruption", "creation_timestamp": "2024-01-22T15:41:29.000000Z"}, {"uuid": "62e969e5-f8d3-41b6-8cc9-fc53232d4df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3311", "type": "seen", "source": "https://t.me/cibsecurity/65324", "content": "\u203c CVE-2023-3311 \u203c\n\nA vulnerability, which was classified as problematic, was found in SourceCodester Advance Charity Management System 1.0. This affects an unknown part of the file addsuppliers.php. The manipulation of the argument First name leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-231807.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-18T18:24:42.000000Z"}, {"uuid": "07415aeb-2a6d-4311-9458-3d8478feb0ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33118", "type": "seen", "source": "https://t.me/cibsecurity/74165", "content": "\u203c\ufe0fCVE-2023-33118\u203c\ufe0f\n\nMemory corruption while processing Listen Sound Model client payload buffer when there is a request for Listen Sound session get parameter from ST HAL.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:34:20.000000Z"}, {"uuid": "2c9a23fd-99c0-424c-91a5-fdb87d7b8d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33117", "type": "seen", "source": "https://t.me/cibsecurity/74164", "content": "\u203c\ufe0fCVE-2023-33117\u203c\ufe0f\n\nMemory corruption when HLOS allocates the response payload buffer to copy the data received from ADSP in response to AVCSLOADMODULE command.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:34:15.000000Z"}, {"uuid": "b245a768-f136-4ce4-8a05-bae51f0a8ea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33116", "type": "seen", "source": "https://t.me/cibsecurity/74163", "content": "\u203c\ufe0fCVE-2023-33116\u203c\ufe0f\n\nTransient DOS while parsing ieee80211parsemscsie in WIN WLAN driver.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:34:10.000000Z"}, {"uuid": "56764163-cc99-41c3-b977-0136a1d2ce6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33114", "type": "seen", "source": "https://t.me/cibsecurity/74162", "content": "\u203c\ufe0fCVE-2023-33114\u203c\ufe0f\n\nMemory corruption while running NPU, when NETWORKUNLOAD and NETWORKUNLOAD or NETWORKEXECUTEV2 commands are submitted at the same time.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:34:05.000000Z"}, {"uuid": "93816304-4a21-42a1-b4ed-3f9540cf16f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33113", "type": "seen", "source": "https://t.me/cibsecurity/74161", "content": "\u203c\ufe0fCVE-2023-33113\u203c\ufe0f\n\nMemory corruption when resource manager sends the host kernel a reply message with multiple fragments.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:34:00.000000Z"}, {"uuid": "2ad9f368-ca5d-4e95-bedd-6927eb86ceb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33112", "type": "seen", "source": "https://t.me/cibsecurity/74160", "content": "\u203c\ufe0fCVE-2023-33112\u203c\ufe0f\n\nTransient DOS when WLAN firmware receives \"reassoc response\" frame including RICDATA element.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:33:55.000000Z"}, {"uuid": "5d459ef6-3a02-47ba-8c7d-37fec14b96ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33110", "type": "seen", "source": "https://t.me/cibsecurity/74159", "content": "\u203c\ufe0fCVE-2023-33110\u203c\ufe0f\n\nThe session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback  PCM close and reset session index causing memory corruption.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:33:50.000000Z"}, {"uuid": "b59035b0-9170-4312-9b7b-a842b94903ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33114", "type": "seen", "source": "https://t.me/ctinow/161536", "content": "https://ift.tt/Uhy5eiS\nCVE-2023-33114", "creation_timestamp": "2024-01-02T07:27:16.000000Z"}, {"uuid": "4294d6df-3ddf-44bb-8b44-6c272a0f8dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33113", "type": "seen", "source": "https://t.me/ctinow/161535", "content": "https://ift.tt/fcpm23O\nCVE-2023-33113", "creation_timestamp": "2024-01-02T07:27:15.000000Z"}, {"uuid": "6e7c49af-5333-48ab-a773-d5f2bf944fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33112", "type": "seen", "source": "https://t.me/ctinow/161534", "content": "https://ift.tt/UI2JKeb\nCVE-2023-33112", "creation_timestamp": "2024-01-02T07:27:14.000000Z"}, {"uuid": "c2fab0f5-a4bb-4ab8-8061-fe5e528beff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33110", "type": "seen", "source": "https://t.me/ctinow/161533", "content": "https://ift.tt/AjwzZaK\nCVE-2023-33110", "creation_timestamp": "2024-01-02T07:27:13.000000Z"}]}