{"vulnerability": "CVE-2023-2060", "sightings": [{"uuid": "da04d423-3963-47dc-95f3-df875b5dfc7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20606", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8852", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20606\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In apusys, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07571104; Issue ID: ALPS07571104.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T14:10:04.684Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2023", "creation_timestamp": "2025-03-26T14:25:19.000000Z"}, {"uuid": "f38e3507-4dd7-4dc0-86f3-ab092288fc97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20608", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20608\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In display drm, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363599; Issue ID: ALPS07363599.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T14:07:40.491Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2023", "creation_timestamp": "2025-03-26T14:25:25.000000Z"}, {"uuid": "02d20524-f302-4a41-9e02-6f174b2153a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20604", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20604\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494067; Issue ID: ALPS07494067.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T14:14:18.445Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2023", "creation_timestamp": "2025-03-26T14:25:10.000000Z"}, {"uuid": "0da8ff67-1a51-4dbc-bd01-9c35a0608d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20607", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8742", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20607\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ccu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07512839; Issue ID: ALPS07512839.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T18:44:17.769Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2023", "creation_timestamp": "2025-03-25T19:24:55.000000Z"}, {"uuid": "bc5c6533-da3c-4150-ac59-acf05c41d096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20605", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8848", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20605\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550104.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T14:12:16.349Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2023", "creation_timestamp": "2025-03-26T14:25:15.000000Z"}, {"uuid": "c29eea60-88f4-4c90-afc9-9d68c146fc03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20602", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8841", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20602\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494107; Issue ID: ALPS07494107.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T14:16:11.696Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2023", "creation_timestamp": "2025-03-26T14:25:03.000000Z"}, {"uuid": "8c7c8e9e-0558-4ac5-9ba7-384a85ce8874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20606", "type": "published-proof-of-concept", "source": "Telegram/qvQRxQdS_UMsEc7T9rQY6WDuPRQgh3CmQncesXSOR3688Q8", "content": "", "creation_timestamp": "2023-02-15T14:10:26.000000Z"}, {"uuid": "d2b5567b-a6c7-4e87-8b9d-781292755890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20607", "type": "seen", "source": "https://t.me/cibsecurity/57606", "content": "\u203c CVE-2023-20607 \u203c\n\nIn ccu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07512839; Issue ID: ALPS07512839.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-06T22:29:42.000000Z"}, {"uuid": "198fa4df-5cb0-4e3a-959b-a9b33babc9f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2060", "type": "seen", "source": "https://t.me/cibsecurity/64877", "content": "\u203c CVE-2023-2060 \u203c\n\nWeak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T12:40:10.000000Z"}, {"uuid": "26331cb6-931b-4b32-99e2-027a1e653850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20608", "type": "seen", "source": "https://t.me/cibsecurity/57597", "content": "\u203c CVE-2023-20608 \u203c\n\nIn display drm, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363599; Issue ID: ALPS07363599.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-06T22:29:31.000000Z"}, {"uuid": "808ed9a6-9964-4d1d-b025-ddb5f0e10654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20609", "type": "seen", "source": "https://t.me/cibsecurity/57595", "content": "\u203c CVE-2023-20609 \u203c\n\nIn ccu, there is a possible out of bounds read due to a logic error. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07570864; Issue ID: ALPS07570864.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-06T22:29:29.000000Z"}, {"uuid": "6577b992-f3f1-4518-9939-16d0231fd031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20606", "type": "seen", "source": "https://t.me/androidMalware/1782", "content": "MediaTek Android information disclosure | CVE-2023-20606\nBy executing a specially-crafted application, an attacker could exploit this vulnerability to obtain sensitive information.\nAffected Software Versions: Android 12.0, 12.1\nhttps://www.redpacketsecurity.com/mediatek-android-information-disclosure-cve-2023-20606/", "creation_timestamp": "2023-03-10T18:52:53.000000Z"}]}