{"vulnerability": "CVE-2023-2105", "sightings": [{"uuid": "7857b045-0bc6-4fd7-8f50-0ae4cff05db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21053", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21053\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In sms_ExtractCbLanguage of sms_CellBroadcast.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-251805610References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T19:44:42.446Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-21T20:18:14.000000Z"}, {"uuid": "80f200e7-5954-42ae-8db6-ce17d9fde51a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21055", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4976", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21055\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In dit_hal_ioctl of dit.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244301523References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T19:27:40.237Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-21T20:18:16.000000Z"}, {"uuid": "237ac22a-5878-4644-937b-c888f7e62bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21054", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4975", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21054\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In EUTRAN_LCS_ConvertLCS_MOLRReq of LPP_CommonUtil.c, there is a possible out of bounds write due to a logic error in the code. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244556535References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T19:35:51.070Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-21T20:18:16.000000Z"}, {"uuid": "9176de50-6721-4a72-8800-c3f7be44f0cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21050", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4999", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21050\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In load_png_image of ExynosHWCHelper.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244423702References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T21:32:13.513Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-21T22:18:57.000000Z"}, {"uuid": "a69d3694-0f03-4dd5-9ae8-99aeab2bc8ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21057", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4980", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21057\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ProfSixDecomTcpSACKoption of RohcPacketCommon, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244450646References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T19:18:36.356Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-21T20:18:23.000000Z"}, {"uuid": "6a6ace31-cbf6-4c11-a849-e6539458f841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21056", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21056\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In lwis_slc_buffer_free of lwis_device_slc.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-245300559References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T19:22:40.078Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-21T20:18:21.000000Z"}, {"uuid": "7c517e5b-fcf2-4e35-9257-87a2a0218df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21051", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5182", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21051\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In dwc3_exynos_clk_get of dwc3-exynos.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-259323322References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-24T17:02:53.391Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-24T17:21:47.000000Z"}, {"uuid": "2d03023c-5272-4f2d-8fda-39a2ae2c060d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5181", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-21052\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In setToExternal of ril_external_client.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-259063189References: N/A\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-24T17:04:09.799Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-24T17:21:47.000000Z"}, {"uuid": "b160d756-405c-41cd-8426-8945f08f3e98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21057", "type": "seen", "source": "Telegram/I5cguvahtPrF3xm6fTx4zAZdKbaPcRAmx3yXILvdBzlm5jSj", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}, {"uuid": "887fdb1e-f478-4d8e-9fa5-915ec218a13b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21056", "type": "seen", "source": "Telegram/zVhPQfBGhjxSkkrhuWAwO4PjGw8roKzd437gf2B80MO10pyu", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}, {"uuid": "38a3c74d-9881-4fa7-b873-5e1ed675d473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21055", "type": "seen", "source": "Telegram/fJN7yRdoIHs9_ScNi0LrGCb6y-fdhyzNSdaik6K4H9cKIk8C", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}, {"uuid": "b75295f5-a48a-4081-84bb-72d02ba5d43a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21053", "type": "seen", "source": "Telegram/k2dDl057OyZe8EEteid2Af9NR5PWDzwaEorhFKgKNmQVcT23", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}, {"uuid": "f93c18cd-87ec-4633-b9e2-9a2360944714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21054", "type": "seen", "source": "Telegram/DiJ_-reMidPTfhIrKmCAjkmK3fUytXKxkvi5CWsA0dIBI3dX", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}, {"uuid": "6635a01a-9d3b-4281-b107-c476b597afc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21054", "type": "seen", "source": "https://t.me/cibsecurity/60717", "content": "\u203c CVE-2023-21054 \u203c\n\nIn EUTRAN_LCS_ConvertLCS_MOLRReq of LPP_CommonUtil.c, there is a possible out of bounds write due to a logic error in the code. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244556535References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:51:01.000000Z"}, {"uuid": "7f9f8d12-afe3-4310-884c-3907d546d604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21057", "type": "seen", "source": "https://t.me/cibsecurity/60693", "content": "\u203c CVE-2023-21057 \u203c\n\nIn ProfSixDecomTcpSACKoption of RohcPacketCommon, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244450646References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:47:53.000000Z"}, {"uuid": "9cf90f85-9298-4b9c-a4fc-a83671400452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21051", "type": "seen", "source": "https://t.me/cibsecurity/60680", "content": "\u203c CVE-2023-21051 \u203c\n\nIn dwc3_exynos_clk_get of dwc3-exynos.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-259323322References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:47:36.000000Z"}, {"uuid": "3110c963-f0fc-4fcb-a348-f58d7da097e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21055", "type": "seen", "source": "https://t.me/cibsecurity/60679", "content": "\u203c CVE-2023-21055 \u203c\n\nIn dit_hal_ioctl of dit.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244301523References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:43:00.000000Z"}]}