{"vulnerability": "CVE-2023-2062", "sightings": [{"uuid": "7a63b186-fa2d-4282-99aa-74ed37e5610d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20628", "type": "seen", "source": "Telegram/Xi2JGAysa0Iw1akmYog-E4KX7igRILyMU4fbPefrQgPcTY4r", "content": "", "creation_timestamp": "2025-03-06T02:17:24.000000Z"}, {"uuid": "279640ce-5a93-40ae-a1ba-24f9c2b62ff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20627", "type": "seen", "source": "Telegram/0Q2ESHwiCDAEU2K90oYnkgR2Z43xStYWnFdty6PVbeaRWHuF", "content": "", "creation_timestamp": "2025-03-08T04:34:10.000000Z"}, {"uuid": "57a21716-db2e-4a82-bff0-a7c9f5bd9d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20626", "type": "seen", "source": "Telegram/CKClGLVo8jzz128WYr7cvcJjIXE7ADCwPyA_qJNHGte1Vzjm", "content": "", "creation_timestamp": "2025-03-08T04:34:10.000000Z"}, {"uuid": "1974b5a8-e393-45c8-8513-4c2d93711490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20625", "type": "seen", "source": "Telegram/zEB4y00nIIGw91K9vcsCz5e7zrt_y3OKRaL98JHosbOCPiLm", "content": "", "creation_timestamp": "2025-03-08T04:34:10.000000Z"}, {"uuid": "cde3ad90-3faa-4c27-ae13-d7cb2d6df146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20627", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6723", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20627\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In pqframework, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629585; Issue ID: ALPS07629585.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T16:59:50.568Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2023", "creation_timestamp": "2025-03-06T17:34:45.000000Z"}, {"uuid": "7df5f3de-cdca-489e-82b9-8df72b2bac2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20624", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6720", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20624\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In vow, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628530; Issue ID: ALPS07628530.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T17:02:26.351Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2023", "creation_timestamp": "2025-03-06T17:34:43.000000Z"}, {"uuid": "693e102d-3e36-445a-be40-9f97c9489678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20623", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6719", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20623\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T17:03:18.918Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2023", "creation_timestamp": "2025-03-06T17:34:39.000000Z"}, {"uuid": "cb2c653a-82b4-4ebc-b07f-d6bb73d730d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20626", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6721", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20626\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In msdc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405223; Issue ID: ALPS07405223.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T17:01:18.391Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2023", "creation_timestamp": "2025-03-06T17:34:43.000000Z"}, {"uuid": "7d82b8a7-d266-4af8-941b-4dd3515641ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20624", "type": "seen", "source": "Telegram/UF-V2diaOBotU9u5xR3CLcmNtjYEszXC2cRxy4rwq1qZInpB", "content": "", "creation_timestamp": "2025-03-08T04:34:10.000000Z"}, {"uuid": "e5c4b0a0-767c-4cd1-a992-1d2cb4e44222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20623", "type": "seen", "source": "Telegram/OsnI-_urnHObdUTkSKSnL1frooz8hiTTCFHl42Pl9Mk83eeQ", "content": "", "creation_timestamp": "2025-03-08T04:34:10.000000Z"}, {"uuid": "89067f56-39b2-4b77-93eb-d2e8145b1f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20623", "type": "seen", "source": "https://t.me/cibsecurity/59626", "content": "\u203c CVE-2023-20623 \u203c\n\nIn ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-08T00:23:41.000000Z"}]}