{"vulnerability": "CVE-2023-4578", "sightings": [{"uuid": "464ca790-c63a-4de8-8648-295c003f8b4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45780", "type": "seen", "source": "https://t.me/cibsecurity/73178", "content": "\u203c CVE-2023-45780 \u203c\n\nIn Print Service, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-30T21:19:58.000000Z"}, {"uuid": "eb8fb830-1cf2-44f4-a7e0-c58acfcf11f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45781", "type": "seen", "source": "https://t.me/ctinow/158999", "content": "https://ift.tt/dYGQJIb\nCVE-2023-45781 | Google Android 12/12L/13/14 utils.cc parse_gap_data information disclosure", "creation_timestamp": "2023-12-24T11:46:13.000000Z"}, {"uuid": "16461658-3d1b-44fa-bbb5-b4b732c91595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4578", "type": "seen", "source": "https://t.me/cibsecurity/70194", "content": "\u203c CVE-2023-4578 \u203c\n\nWhen calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:08.000000Z"}]}