{"vulnerability": "CVE-2023-2096", "sightings": [{"uuid": "1503d931-909c-406e-a2ed-b68cda401af9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "5f40863d-8fbd-496c-9222-6ad7b25d482b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971800", "content": "", "creation_timestamp": "2024-12-24T20:34:13.081426Z"}, {"uuid": "60eff717-60f4-435c-b70e-e4bddd132744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20966", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5385", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20966\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In inflate of inflate.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-242299736\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T21:18:51.938Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2023-03-01", "creation_timestamp": "2025-02-25T21:27:46.000000Z"}, {"uuid": "6261cc5b-ee43-456f-bcea-18bb8ed7473a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-20963", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/11298999-a48b-4206-94d4-a8cce902a285", "content": "", "creation_timestamp": "2026-02-02T12:27:01.123093Z"}, {"uuid": "573ff077-7bf7-49db-bc8b-e1af13153b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4543", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)\nURL\uff1ahttps://github.com/Chal13W1zz/BadParcel\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-12T11:13:38.000000Z"}, {"uuid": "c4792ee0-4ebc-4dc1-98be-364bc6ccbe5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3315", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20963\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2023-03-24T20:15:10.010\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2023-03-01\n2. https://source.android.com/security/bulletin/2023-03-01", "creation_timestamp": "2025-01-28T23:18:13.000000Z"}, {"uuid": "44ac00c5-8e00-476b-a1e3-70f1251b4e13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:40.000000Z"}, {"uuid": "f75358ff-a72e-4fae-8624-0b5e3d69c941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/DaleelCyberSecurity/80", "content": "\u0645\u0627 \u0647\u064a \u062b\u063a\u0631\u0629 \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 (Zero-Day Exploit)\u061f\n\n\u0647\u064a \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u063a\u064a\u0631 \u0645\u0639\u0631\u0648\u0641\u0629 \u0644\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0623\u0648 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u0645\u0633\u0624\u0648\u0644\u0629 \u0639\u0646 \u0627\u0644\u0646\u0638\u0627\u0645\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0623\u0646\u0647\u0627 \u0644\u0645 \u062a\u064f\u0635\u0644\u062d \u0628\u0639\u062f \u0648\u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u064a\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0623\u0648 \u0625\u0635\u062f\u0627\u0631 \u062a\u062d\u062f\u064a\u062b \u0644\u0647\u0627.\n\n\n---\n\n\u0643\u064a\u0641 \u062a\u0639\u0645\u0644\u061f\n\n\u0639\u0646\u062f \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0629 \u062c\u062f\u064a\u062f\u0629\u060c \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u062a\u0635\u062f\u0631 \u0627\u0644\u0634\u0631\u0643\u0629 \u062a\u0635\u062d\u064a\u062d\u064b\u0627 \u0623\u0645\u0646\u064a\u064b\u0627. \u064a\u062a\u0645 \u0630\u0644\u0643 \u0639\u0627\u062f\u0629\u064b \u0645\u0646 \u062e\u0644\u0627\u0644:\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0623\u062e\u0637\u0627\u0621 \u0628\u0631\u0645\u062c\u064a\u0629 \u0641\u064a \u0627\u0644\u0646\u0638\u0627\u0645 \u0623\u0648 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a.\n\n\u062a\u062c\u0627\u0648\u0632 \u0622\u0644\u064a\u0627\u062a \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u062b\u0644 SELinux \u0623\u0648 Google Play Protect.\n\n\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u062e\u0628\u064a\u062b\u0629 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0644\u0627\u062d\u064a\u0627\u062a \u0645\u0631\u062a\u0641\u0639\u0629 (Root \u0623\u0648 SYSTEM).\n\n\n\n---\n\n\u0643\u064a\u0641 \u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f\u061f\n\n\u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f \u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u0643\u0648\u0646 \u0641\u064a \u0639\u062f\u0629 \u0623\u0645\u0627\u0643\u0646:\n\n1. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u0646\u0638\u0627\u0645 (Kernel Exploits):\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0623\u062e\u0637\u0627\u0621 \u0641\u064a \u0646\u0648\u0627\u0629 \u0627\u0644\u0646\u0638\u0627\u0645 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0644\u0627\u062d\u064a\u0627\u062a \u0645\u0631\u062a\u0641\u0639\u0629.\n\n\u0623\u0645\u062b\u0644\u0629: \u062b\u063a\u0631\u0629 Dirty Cow (CVE-2016-5195)\u060c \u0648\u062b\u063a\u0631\u0627\u062a \u062a\u062c\u0627\u0648\u0632 SELinux.\n\n\n\n2. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 (Framework Exploits):\n\n\u0627\u0633\u062a\u0647\u062f\u0627\u0641 \u0645\u0643\u0648\u0646\u0627\u062a \u0627\u0644\u0646\u0638\u0627\u0645 \u0645\u062b\u0644 MediaServer \u0623\u0648 WebView.\n\n\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0645\u0644\u0641\u0627\u062a PDF \u0623\u0648 MP4 \u0623\u0648 \u0635\u0648\u0631 \u0645\u0634\u0648\u0647\u0629.\n\n\n\n3. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d\u0627\u062a (Browser Exploits):\n\n\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u062c\u0627\u0641\u0627\u0633\u0643\u0631\u064a\u0628\u062a \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 WebView \u0623\u0648 Chrome.\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 JavaScript Engine \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062a\u0646\u0641\u064a\u0630 \u0643\u0648\u062f \u0639\u0646 \u0628\u0639\u062f (RCE).\n\n\n\n4. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0630\u0627\u0643\u0631\u0629 (Heap / Stack Exploits):\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0642\u0646\u064a\u0627\u062a \u0645\u062b\u0644 Buffer Overflow \u0623\u0648 Use-After-Free \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062a\u062d\u0643\u0645 \u0643\u0627\u0645\u0644 \u0628\u0627\u0644\u062c\u0647\u0627\u0632.\n\n\n\n5. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u062e\u062f\u0645\u0627\u062a \u0627\u0644\u0646\u0638\u0627\u0645 (System Services Exploits):\n\n\u0645\u062b\u0644 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 ADB \u0641\u064a \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u064a \u062a\u062a\u0631\u0643\u0647 \u0645\u0641\u0639\u0651\u0644\u064b\u0627.\n\n\n\n\n\n---\n\n\u0643\u064a\u0641 \u064a\u062d\u0635\u0644 \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0639\u0644\u0649 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u061f\n\n\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0644\u0644\u0628\u062d\u062b \u0639\u0646 \u062a\u063a\u064a\u064a\u0631\u0627\u062a \u064a\u0645\u0643\u0646 \u0639\u0643\u0633\u0647\u0627 \u0644\u0627\u0633\u062a\u0646\u062a\u0627\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\u0645\u0631\u0627\u062c\u0639\u0629 \u0627\u0644\u0643\u0648\u062f \u0627\u0644\u0645\u0635\u062f\u0631\u064a \u0644\u0623\u0646\u0638\u0645\u0629 \u0623\u0646\u062f\u0631\u0648\u064a\u062f \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 (AOSP).\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Fuzzing \u0644\u0625\u0631\u0633\u0627\u0644 \u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0633\u0644\u0648\u0643 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a.\n\n\u0627\u0644\u0628\u062d\u062b \u0641\u064a \u0627\u0644\u062a\u0633\u0631\u064a\u0628\u0627\u062a \u0648\u0627\u0644\u0645\u0646\u062a\u062f\u064a\u0627\u062a \u0627\u0644\u0633\u0631\u064a\u0629 \u062d\u064a\u062b \u064a\u062a\u0645 \u0628\u064a\u0639 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\n\n---\n\n\u0647\u0644 \u064a\u0645\u0643\u0646\u0646\u064a \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062b\u063a\u0631\u0629 \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u061f\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u0628\u0627\u062d\u062b\u064b\u0627 \u0623\u0645\u0646\u064a\u064b\u0627\u060c \u064a\u0645\u0643\u0646\u0643 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0623\u062f\u0648\u0627\u062a \u0645\u062b\u0644 AFL\u060c Frida\u060c Ghidra\u060c IDA Pro \u0644\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u062a\u0631\u064a\u062f \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u0642\u0637\u060c \u0641\u0645\u0639\u0638\u0645 \u062b\u063a\u0631\u0627\u062a Zero-Day \u062a\u0643\u0648\u0646 \u062e\u0627\u0635\u0629 \u0648\u064a\u062a\u0645 \u0628\u064a\u0639\u0647\u0627 \u0641\u064a \u0627\u0644\u0633\u0648\u0642 \u0627\u0644\u0633\u0648\u062f\u0627\u0621 \u0628\u0623\u0633\u0639\u0627\u0631 \u062a\u0628\u062f\u0623 \u0645\u0646 10,000$ \u0648\u0642\u062f \u062a\u0635\u0644 \u0625\u0644\u0649 \u0645\u0644\u064a\u0648\u0646 \u062f\u0648\u0644\u0627\u0631 (\u062e\u0627\u0635\u0629 \u062b\u063a\u0631\u0627\u062a iOS \u0648\u0623\u0646\u062f\u0631\u0648\u064a\u062f).\n\n\n\n---\n\n\u0623\u0634\u0647\u0631 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f\n\nCVE-2019-2215: \u062b\u063a\u0631\u0629 \u062a\u062c\u0627\u0648\u0632 Kernel Sandbox.\n\nCVE-2020-0022: \u062b\u063a\u0631\u0629 Bluetooth RCE \u062a\u062a\u064a\u062d \u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0646 \u0628\u0639\u062f.\n\nCVE-2023-20963: \u0627\u0633\u062a\u063a\u0644\u0627\u0644 Intent \u0644\u0644\u0647\u0631\u0648\u0628 \u0645\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629.\n\nCVE-2024-XXXX (\u062a\u064f\u0643\u062a\u0634\u0641 \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631).\n\n\n\n---\n\n\u0643\u064a\u0641 \u062a\u062d\u0645\u064a \u0646\u0641\u0633\u0643\u061f\n\n\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0646\u0638\u0627\u0645 \u0648\u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631.\n\n\u062a\u0639\u0637\u064a\u0644 ADB \u0648 Debugging \u0639\u0646\u062f \u0639\u062f\u0645 \u0627\u0644\u062d\u0627\u062c\u0629 \u0625\u0644\u064a\u0647.\n\n\u062a\u062c\u0646\u0628 \u062a\u062d\u0645\u064a\u0644 \u062a\u0637\u0628\u064a\u0642\u0627\u062a APK \u0645\u0646 \u0645\u0635\u0627\u062f\u0631 \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642\u0629.\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 ROMs \u0645\u0639\u062f\u0644\u0629 \u0628\u0645\u064a\u0632\u0627\u062a \u0623\u0645\u0627\u0646 \u0625\u0636\u0627\u0641\u064a\u0629 \u0645\u062b\u0644 GrapheneOS \u0623\u0648 CalyxOS.\n\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u062a\u0631\u064a\u062f \u062a\u0639\u0644\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0623\u0648 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u060c \u0623\u0646\u0635\u062d\u0643 \u0628\u062f\u0631\u0627\u0633\u0629 \u0647\u0646\u062f\u0633\u0629 \u0639\u0643\u0633\u064a\u0629 (Reverse Engineering) \u0648\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 (Malware Analysis).", "creation_timestamp": "2025-01-30T18:05:01.000000Z"}, {"uuid": "2ebe7be8-73dd-46bc-ad32-d667f189788a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20964", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5317", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20964\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In multiple functions of MediaSessionRecord.java, there is a possible Intent rebroadcast due to a confused deputy. This could lead to local denial of service or escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-238177121\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T16:10:21.912Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2023-03-01", "creation_timestamp": "2025-02-25T16:23:01.000000Z"}, {"uuid": "b25701f6-f67e-4ab4-8f43-8b3739db8d38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20962", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5315", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20962\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In getSliceEndItem of MediaVolumePreferenceController.java, there is a possible way to start foreground activity from the background due to an unsafe PendingIntent. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256590210\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T16:12:57.498Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2023-03-01", "creation_timestamp": "2025-02-25T16:22:57.000000Z"}, {"uuid": "cb7291db-5476-4267-a757-38e54fa999e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20960", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5314", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20960\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In launchDeepLinkIntentToRight of SettingsHomepageActivity.java, there is a possible way to launch arbitrary activities due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-250589026\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T16:14:12.973Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2023-03-01", "creation_timestamp": "2025-02-25T16:22:56.000000Z"}, {"uuid": "ef3d72c9-6835-4d1c-9da8-ca92f5d80667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20969", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5319", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20969\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In multiple locations of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236313\n\ud83d\udccf Published: 2023-03-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-25T16:05:46.032Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2023-03-01", "creation_timestamp": "2025-02-25T16:23:03.000000Z"}, {"uuid": "68c42ae4-26fe-4e2f-8fef-2fbcfbe6dc1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/arpsyndicate/1068", "content": "#ExploitObserverAlert\n\nCVE-2023-20963\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-20963. In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519\n\nFIRST-EPSS: 0.002240000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-04T00:23:56.000000Z"}, {"uuid": "df3b6db7-299c-4405-8a89-0b9ee8600085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/arpsyndicate/2957", "content": "#ExploitObserverAlert\n\nCVE-2023-20963\n\nDESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2023-20963. In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519\n\nFIRST-EPSS: 0.002240000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-19T20:08:55.000000Z"}, {"uuid": "4c8b7b0b-33ce-460a-961a-9ef4b6383498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2096", "type": "seen", "source": "https://t.me/arpsyndicate/574", "content": "#ExploitObserverAlert\n\nCVE-2023-2096\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2096. A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/service_requests/manage_inventory.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226104.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T05:39:26.000000Z"}, {"uuid": "18f42bbb-2468-4217-af36-ce7f6de92da2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20966", "type": "seen", "source": "https://t.me/cibsecurity/60694", "content": "\u203c CVE-2023-20966 \u203c\n\nIn inflate of inflate.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-242299736\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:47:53.000000Z"}, {"uuid": "58aad44b-fae5-474d-9cf9-dba21a28d47d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2096", "type": "seen", "source": "https://t.me/arpsyndicate/1640", "content": "#ExploitObserverAlert\n\nCVE-2023-2096\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2096. A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/service_requests/manage_inventory.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226104.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T14:53:45.000000Z"}, {"uuid": "54b59fc5-82f4-4c29-b537-3a973f569863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "exploited", "source": "Telegram/r9pSH-zaZzJ85yrAwBqJG-jTD9RHKE_8OIhFvQLWl5Z4", "content": "", "creation_timestamp": "2023-06-03T04:34:41.000000Z"}, {"uuid": "bead17e2-59d5-4c09-9fe4-b9a748bc3b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20965", "type": "seen", "source": "https://t.me/cibsecurity/68490", "content": "\u203c CVE-2023-20965 \u203c\n\nIn processMessageImpl of ClientModeImpl.java, there is a possible credential disclosure in the TOFU flow due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T00:19:53.000000Z"}, {"uuid": "c76b6f14-c7e4-4d52-95c7-bc2251f3bc91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2096", "type": "seen", "source": "https://t.me/cibsecurity/62218", "content": "\u203c CVE-2023-2096 \u203c\n\nA vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/service_requests/manage_inventory.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226104.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-15T14:36:43.000000Z"}, {"uuid": "aedc6483-7938-45f6-84a5-c7de06cf1172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/Rootsec_2/2124", "content": "#exploit\n1. CVE-2023-20963:\nAndroid: mismatching parcel/unparcel logic for WorkSource\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-20963.html\n2. CVE-2023-36041:\nMicrosoft Excel RCE\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2023-1835", "creation_timestamp": "2024-08-16T08:52:59.000000Z"}, {"uuid": "986173cb-daba-483c-a44a-3d9d5133d610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/9475", "content": "#exploit\n1. CVE-2023-20963:\nAndroid: mismatching parcel/unparcel logic for WorkSource\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-20963.html\n2. CVE-2023-36041:\nMicrosoft Excel RCE\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2023-1835", "creation_timestamp": "2023-11-27T12:27:01.000000Z"}, {"uuid": "a363901a-8852-4b9d-a04e-7260a078b1d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/cibsecurity/60683", "content": "\u203c CVE-2023-20963 \u203c\n\nIn WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:47:39.000000Z"}, {"uuid": "cafd9f4e-61aa-4835-98a9-5582ea40109b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "exploited", "source": "https://t.me/androidMalware/1912", "content": "CVE-2023-20963: 0-day in Android's Parcel serialization/deserialization which was used in-the-wild by the Pinduoduo app \nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-20963.html", "creation_timestamp": "2023-06-10T08:57:29.000000Z"}]}