{"vulnerability": "CVE-2023-4012", "sightings": [{"uuid": "8e82c185-26d5-4e8e-b585-255fe6a0c7df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40129", "type": "seen", "source": "https://bsky.app/profile/stringsvsatoms.bsky.social/post/3m4bpaprspg22", "content": "", "creation_timestamp": "2025-10-28T19:48:39.464144Z"}, {"uuid": "c46776d4-8d89-4d1e-b9b6-1612910da0e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40122", "type": "seen", "source": "https://t.me/ctinow/186079", "content": "https://ift.tt/AbZx3UV\nCVE-2023-40122", "creation_timestamp": "2024-02-16T03:21:46.000000Z"}, {"uuid": "ceef50e1-484b-4d88-a12e-889e6301276b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40129", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m47udgxpf42c", "content": "", "creation_timestamp": "2025-10-28T02:14:20.355694Z"}, {"uuid": "ecc00964-719b-464c-bc53-869af27a2a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-40122", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/cf59c148-4047-4ccd-8ba0-26fb7197899c", "content": "", "creation_timestamp": "2025-02-03T19:33:09.293698Z"}, {"uuid": "77a2668f-3ede-4967-b8f4-d117a04a8f6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40121", "type": "seen", "source": "https://t.me/android_guards_today/261", "content": "\u041d\u0435\u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u043d\u0430\u0437\u0430\u0434 \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043b\u0441\u044f \u0438 \u0432\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u043b \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2023-40121) \u0432 \u043a\u043e\u0434\u0435 android \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0435\u043c \u0441 SQLite. \u042d\u0442\u043e \u0442\u043e\u0442 \u0440\u0435\u0434\u043a\u0438\u0439 \u0441\u043b\u0443\u0447\u0430\u0439, \u043a\u043e\u0433\u0434\u0430 \u0432 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android \u043f\u043e\u043f\u0430\u0434\u0430\u0435\u0442\u0441\u044f \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0447\u0442\u043e-\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435, \u0430 \u043d\u0435 \u0432\u0441\u044f\u043a\u0438\u0435 \u0441\u0442\u0440\u0430\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0443\u0437\u043d\u0430\u0442\u044c \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u043a\u0430\u043a\u0430\u044f-\u0442\u043e \u0438\u043a\u043e\u043d\u043a\u0430 \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u043d\u0435\u0442.  \u041f\u0440\u0438\u044f\u0442\u043d\u043e\u0433\u043e \u0447\u0442\u0435\u043d\u0438\u044f.\n\nP.S. \u0410 \u0432\u043e\u043e\u0431\u0449\u0435, \u0435\u0441\u043b\u0438 \u0432\u0430\u043c \u043d\u0440\u0430\u0432\u0438\u0442\u0441\u044f \u0432\u0441\u0435 \u044d\u0442\u043e \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u043e, \u0442\u043e \u043f\u043e\u043a\u0438\u0434\u0430\u0439\u0442\u0435 \u0431\u0443\u0441\u0442\u043e\u0432 \u043d\u0430 \u043a\u0430\u043d\u0430\u043b: https://t.me/boost/android_guards_today \ud83c\udf1a\n#cve", "creation_timestamp": "2024-03-13T14:56:58.000000Z"}, {"uuid": "f7947fac-04b2-49c1-a5d0-2de23c183c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40123", "type": "seen", "source": "https://t.me/cibsecurity/73084", "content": "\u203c CVE-2023-40123 \u203c\n\nIn updateActionViews of PipMenuView.java, there is a possible bypass of a multi user security boundary due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:24.000000Z"}, {"uuid": "477d96c4-998b-40f3-88d7-e51656dcbb5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40121", "type": "seen", "source": "https://t.me/cibsecurity/73082", "content": "\u203c CVE-2023-40121 \u203c\n\nIn appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:21.000000Z"}, {"uuid": "d81fbe6c-f169-4011-bedf-d906bc466e49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40125", "type": "seen", "source": "https://t.me/cibsecurity/73083", "content": "\u203c CVE-2023-40125 \u203c\n\nIn onCreate of ApnEditor.java, there is a possible way for a Guest user to change the APN due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:22.000000Z"}, {"uuid": "d59c6971-a329-44e2-ae70-0990f26b27b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40129", "type": "seen", "source": "https://bsky.app/profile/synacktiv.com/post/3m46s4lsgb22n", "content": "", "creation_timestamp": "2025-10-27T16:02:04.826215Z"}, {"uuid": "59f3bbea-9955-4e21-ac6d-1157404241cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40120", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14892", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40120\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In multiple locations, there is a possible way to bypass user notification of foreground services due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2023-10-27T20:22:56.553Z\n\ud83d\udccf Modified: 2025-05-05T14:59:10.242Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b\n2. https://source.android.com/security/bulletin/2023-10-01", "creation_timestamp": "2025-05-05T15:20:20.000000Z"}, {"uuid": "9e63ea48-5fd0-483b-a1e3-69a1e7d8bd6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40125", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14893", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40125\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In onCreate of ApnEditor.java, there is a possible way for a Guest user to change the APN due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2023-10-27T20:22:57.089Z\n\ud83d\udccf Modified: 2025-05-05T14:59:00.509Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/packages/apps/Settings/+/63d464c3fa5c7b9900448fef3844790756e557eb\n2. https://source.android.com/security/bulletin/2023-10-01", "creation_timestamp": "2025-05-05T15:20:21.000000Z"}, {"uuid": "e8aca8df-d47b-41dc-92e9-b7c290fb4fa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40121", "type": "seen", "source": "https://t.me/arpsyndicate/2167", "content": "#ExploitObserverAlert\n\nCVE-2023-40121\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-40121. In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-28T00:40:09.000000Z"}, {"uuid": "a89eafc1-b863-4c52-a087-6883adfa0983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40127", "type": "seen", "source": "https://t.me/cibsecurity/73091", "content": "\u203c CVE-2023-40127 \u203c\n\nIn multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:31.000000Z"}, {"uuid": "dc275c52-205c-4912-aadd-2c7760c7b653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40128", "type": "seen", "source": "https://t.me/cibsecurity/73086", "content": "\u203c CVE-2023-40128 \u203c\n\nIn several functions of xmlregexp.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-28T00:17:26.000000Z"}, {"uuid": "39d9d37f-1899-4315-a19d-acf9b8dc5be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40124", "type": "seen", "source": "https://t.me/ctinow/186015", "content": "https://ift.tt/GTikzDK\nCVE-2023-40124", "creation_timestamp": "2024-02-16T00:26:32.000000Z"}, {"uuid": "fdbf63b9-c109-48e9-a7c6-76dfe0128c13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4012", "type": "seen", "source": "https://t.me/cibsecurity/67906", "content": "\u203c CVE-2023-4012 \u203c\n\nntpd will crash if the server is not NTS-enabled (no certificate) and it receives an NTS-enabled client request (mode 3).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T22:18:37.000000Z"}]}