{"vulnerability": "CVE-2023-2164", "sightings": [{"uuid": "b5c70116-9a39-4421-a452-c6660d43c101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21646", "type": "seen", "source": "https://t.me/cibsecurity/69828", "content": "\u203c CVE-2023-21646 \u203c\n\nTransient DOS in Modem while processing invalid System Information Block 1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T12:17:02.000000Z"}, {"uuid": "91abea7f-4c1c-4f60-bcde-e15758cf5bc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21644", "type": "seen", "source": "https://t.me/cibsecurity/69838", "content": "\u203c CVE-2023-21644 \u203c\n\nMemory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T12:17:13.000000Z"}, {"uuid": "4977cbcc-5869-46aa-9704-68d5324031b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21641", "type": "seen", "source": "https://t.me/cibsecurity/65919", "content": "\u203c CVE-2023-21641 \u203c\n\nAn app with non-privileged access can change global system brightness and cause undesired system behavior.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:08.000000Z"}, {"uuid": "55577915-6eeb-4245-9d8f-5f7ce6200b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-21640", "type": "seen", "source": "https://t.me/cibsecurity/65926", "content": "\u203c CVE-2023-21640 \u203c\n\nMemory corruption in Linux when the file upload API is called with parameters having large buffer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:18.000000Z"}, {"uuid": "aab20aa7-8fb9-4699-978b-57271b121208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2164", "type": "seen", "source": "https://t.me/cibsecurity/67554", "content": "\u203c CVE-2023-2164 \u203c\n\nAn issue has been discovered in GitLab affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to trigger a stored XSS vulnerability via user interaction with a crafted URL in the WebIDE beta.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T07:39:06.000000Z"}]}