{"vulnerability": "CVE-2023-20963", "sightings": [{"uuid": "1503d931-909c-406e-a2ed-b68cda401af9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "5f40863d-8fbd-496c-9222-6ad7b25d482b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971800", "content": "", "creation_timestamp": "2024-12-24T20:34:13.081426Z"}, {"uuid": "573ff077-7bf7-49db-bc8b-e1af13153b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4543", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)\nURL\uff1ahttps://github.com/Chal13W1zz/BadParcel\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-12T11:13:38.000000Z"}, {"uuid": "44ac00c5-8e00-476b-a1e3-70f1251b4e13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:40.000000Z"}, {"uuid": "6261cc5b-ee43-456f-bcea-18bb8ed7473a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-20963", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/11298999-a48b-4206-94d4-a8cce902a285", "content": "", "creation_timestamp": "2026-02-02T12:27:01.123093Z"}, {"uuid": "f75358ff-a72e-4fae-8624-0b5e3d69c941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/DaleelCyberSecurity/80", "content": "\u0645\u0627 \u0647\u064a \u062b\u063a\u0631\u0629 \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 (Zero-Day Exploit)\u061f\n\n\u0647\u064a \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u063a\u064a\u0631 \u0645\u0639\u0631\u0648\u0641\u0629 \u0644\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0623\u0648 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u0645\u0633\u0624\u0648\u0644\u0629 \u0639\u0646 \u0627\u0644\u0646\u0638\u0627\u0645\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0623\u0646\u0647\u0627 \u0644\u0645 \u062a\u064f\u0635\u0644\u062d \u0628\u0639\u062f \u0648\u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u064a\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0623\u0648 \u0625\u0635\u062f\u0627\u0631 \u062a\u062d\u062f\u064a\u062b \u0644\u0647\u0627.\n\n\n---\n\n\u0643\u064a\u0641 \u062a\u0639\u0645\u0644\u061f\n\n\u0639\u0646\u062f \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0629 \u062c\u062f\u064a\u062f\u0629\u060c \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u062a\u0635\u062f\u0631 \u0627\u0644\u0634\u0631\u0643\u0629 \u062a\u0635\u062d\u064a\u062d\u064b\u0627 \u0623\u0645\u0646\u064a\u064b\u0627. \u064a\u062a\u0645 \u0630\u0644\u0643 \u0639\u0627\u062f\u0629\u064b \u0645\u0646 \u062e\u0644\u0627\u0644:\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0623\u062e\u0637\u0627\u0621 \u0628\u0631\u0645\u062c\u064a\u0629 \u0641\u064a \u0627\u0644\u0646\u0638\u0627\u0645 \u0623\u0648 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a.\n\n\u062a\u062c\u0627\u0648\u0632 \u0622\u0644\u064a\u0627\u062a \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u062b\u0644 SELinux \u0623\u0648 Google Play Protect.\n\n\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u062e\u0628\u064a\u062b\u0629 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0644\u0627\u062d\u064a\u0627\u062a \u0645\u0631\u062a\u0641\u0639\u0629 (Root \u0623\u0648 SYSTEM).\n\n\n\n---\n\n\u0643\u064a\u0641 \u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f\u061f\n\n\u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f \u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u0643\u0648\u0646 \u0641\u064a \u0639\u062f\u0629 \u0623\u0645\u0627\u0643\u0646:\n\n1. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u0646\u0638\u0627\u0645 (Kernel Exploits):\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0623\u062e\u0637\u0627\u0621 \u0641\u064a \u0646\u0648\u0627\u0629 \u0627\u0644\u0646\u0638\u0627\u0645 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0644\u0627\u062d\u064a\u0627\u062a \u0645\u0631\u062a\u0641\u0639\u0629.\n\n\u0623\u0645\u062b\u0644\u0629: \u062b\u063a\u0631\u0629 Dirty Cow (CVE-2016-5195)\u060c \u0648\u062b\u063a\u0631\u0627\u062a \u062a\u062c\u0627\u0648\u0632 SELinux.\n\n\n\n2. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 (Framework Exploits):\n\n\u0627\u0633\u062a\u0647\u062f\u0627\u0641 \u0645\u0643\u0648\u0646\u0627\u062a \u0627\u0644\u0646\u0638\u0627\u0645 \u0645\u062b\u0644 MediaServer \u0623\u0648 WebView.\n\n\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0645\u0644\u0641\u0627\u062a PDF \u0623\u0648 MP4 \u0623\u0648 \u0635\u0648\u0631 \u0645\u0634\u0648\u0647\u0629.\n\n\n\n3. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d\u0627\u062a (Browser Exploits):\n\n\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u062c\u0627\u0641\u0627\u0633\u0643\u0631\u064a\u0628\u062a \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 WebView \u0623\u0648 Chrome.\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 JavaScript Engine \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062a\u0646\u0641\u064a\u0630 \u0643\u0648\u062f \u0639\u0646 \u0628\u0639\u062f (RCE).\n\n\n\n4. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0630\u0627\u0643\u0631\u0629 (Heap / Stack Exploits):\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0642\u0646\u064a\u0627\u062a \u0645\u062b\u0644 Buffer Overflow \u0623\u0648 Use-After-Free \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062a\u062d\u0643\u0645 \u0643\u0627\u0645\u0644 \u0628\u0627\u0644\u062c\u0647\u0627\u0632.\n\n\n\n5. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u062e\u062f\u0645\u0627\u062a \u0627\u0644\u0646\u0638\u0627\u0645 (System Services Exploits):\n\n\u0645\u062b\u0644 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 ADB \u0641\u064a \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u064a \u062a\u062a\u0631\u0643\u0647 \u0645\u0641\u0639\u0651\u0644\u064b\u0627.\n\n\n\n\n\n---\n\n\u0643\u064a\u0641 \u064a\u062d\u0635\u0644 \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0639\u0644\u0649 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u061f\n\n\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0644\u0644\u0628\u062d\u062b \u0639\u0646 \u062a\u063a\u064a\u064a\u0631\u0627\u062a \u064a\u0645\u0643\u0646 \u0639\u0643\u0633\u0647\u0627 \u0644\u0627\u0633\u062a\u0646\u062a\u0627\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\u0645\u0631\u0627\u062c\u0639\u0629 \u0627\u0644\u0643\u0648\u062f \u0627\u0644\u0645\u0635\u062f\u0631\u064a \u0644\u0623\u0646\u0638\u0645\u0629 \u0623\u0646\u062f\u0631\u0648\u064a\u062f \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 (AOSP).\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Fuzzing \u0644\u0625\u0631\u0633\u0627\u0644 \u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0633\u0644\u0648\u0643 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a.\n\n\u0627\u0644\u0628\u062d\u062b \u0641\u064a \u0627\u0644\u062a\u0633\u0631\u064a\u0628\u0627\u062a \u0648\u0627\u0644\u0645\u0646\u062a\u062f\u064a\u0627\u062a \u0627\u0644\u0633\u0631\u064a\u0629 \u062d\u064a\u062b \u064a\u062a\u0645 \u0628\u064a\u0639 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\n\n---\n\n\u0647\u0644 \u064a\u0645\u0643\u0646\u0646\u064a \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062b\u063a\u0631\u0629 \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u061f\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u0628\u0627\u062d\u062b\u064b\u0627 \u0623\u0645\u0646\u064a\u064b\u0627\u060c \u064a\u0645\u0643\u0646\u0643 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0623\u062f\u0648\u0627\u062a \u0645\u062b\u0644 AFL\u060c Frida\u060c Ghidra\u060c IDA Pro \u0644\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u062a\u0631\u064a\u062f \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u0642\u0637\u060c \u0641\u0645\u0639\u0638\u0645 \u062b\u063a\u0631\u0627\u062a Zero-Day \u062a\u0643\u0648\u0646 \u062e\u0627\u0635\u0629 \u0648\u064a\u062a\u0645 \u0628\u064a\u0639\u0647\u0627 \u0641\u064a \u0627\u0644\u0633\u0648\u0642 \u0627\u0644\u0633\u0648\u062f\u0627\u0621 \u0628\u0623\u0633\u0639\u0627\u0631 \u062a\u0628\u062f\u0623 \u0645\u0646 10,000$ \u0648\u0642\u062f \u062a\u0635\u0644 \u0625\u0644\u0649 \u0645\u0644\u064a\u0648\u0646 \u062f\u0648\u0644\u0627\u0631 (\u062e\u0627\u0635\u0629 \u062b\u063a\u0631\u0627\u062a iOS \u0648\u0623\u0646\u062f\u0631\u0648\u064a\u062f).\n\n\n\n---\n\n\u0623\u0634\u0647\u0631 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f\n\nCVE-2019-2215: \u062b\u063a\u0631\u0629 \u062a\u062c\u0627\u0648\u0632 Kernel Sandbox.\n\nCVE-2020-0022: \u062b\u063a\u0631\u0629 Bluetooth RCE \u062a\u062a\u064a\u062d \u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0646 \u0628\u0639\u062f.\n\nCVE-2023-20963: \u0627\u0633\u062a\u063a\u0644\u0627\u0644 Intent \u0644\u0644\u0647\u0631\u0648\u0628 \u0645\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629.\n\nCVE-2024-XXXX (\u062a\u064f\u0643\u062a\u0634\u0641 \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631).\n\n\n\n---\n\n\u0643\u064a\u0641 \u062a\u062d\u0645\u064a \u0646\u0641\u0633\u0643\u061f\n\n\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0646\u0638\u0627\u0645 \u0648\u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631.\n\n\u062a\u0639\u0637\u064a\u0644 ADB \u0648 Debugging \u0639\u0646\u062f \u0639\u062f\u0645 \u0627\u0644\u062d\u0627\u062c\u0629 \u0625\u0644\u064a\u0647.\n\n\u062a\u062c\u0646\u0628 \u062a\u062d\u0645\u064a\u0644 \u062a\u0637\u0628\u064a\u0642\u0627\u062a APK \u0645\u0646 \u0645\u0635\u0627\u062f\u0631 \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642\u0629.\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 ROMs \u0645\u0639\u062f\u0644\u0629 \u0628\u0645\u064a\u0632\u0627\u062a \u0623\u0645\u0627\u0646 \u0625\u0636\u0627\u0641\u064a\u0629 \u0645\u062b\u0644 GrapheneOS \u0623\u0648 CalyxOS.\n\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u062a\u0631\u064a\u062f \u062a\u0639\u0644\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0623\u0648 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u060c \u0623\u0646\u0635\u062d\u0643 \u0628\u062f\u0631\u0627\u0633\u0629 \u0647\u0646\u062f\u0633\u0629 \u0639\u0643\u0633\u064a\u0629 (Reverse Engineering) \u0648\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 (Malware Analysis).", "creation_timestamp": "2025-01-30T18:05:01.000000Z"}, {"uuid": "c4792ee0-4ebc-4dc1-98be-364bc6ccbe5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3315", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-20963\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2023-03-24T20:15:10.010\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2023-03-01\n2. https://source.android.com/security/bulletin/2023-03-01", "creation_timestamp": "2025-01-28T23:18:13.000000Z"}, {"uuid": "df3b6db7-299c-4405-8a89-0b9ee8600085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/arpsyndicate/2957", "content": "#ExploitObserverAlert\n\nCVE-2023-20963\n\nDESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2023-20963. In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519\n\nFIRST-EPSS: 0.002240000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-19T20:08:55.000000Z"}, {"uuid": "68c42ae4-26fe-4e2f-8fef-2fbcfbe6dc1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/arpsyndicate/1068", "content": "#ExploitObserverAlert\n\nCVE-2023-20963\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-20963. In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519\n\nFIRST-EPSS: 0.002240000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-04T00:23:56.000000Z"}, {"uuid": "cafd9f4e-61aa-4835-98a9-5582ea40109b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "exploited", "source": "https://t.me/androidMalware/1912", "content": "CVE-2023-20963: 0-day in Android's Parcel serialization/deserialization which was used in-the-wild by the Pinduoduo app \nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-20963.html", "creation_timestamp": "2023-06-10T08:57:29.000000Z"}, {"uuid": "54b59fc5-82f4-4c29-b537-3a973f569863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "exploited", "source": "Telegram/r9pSH-zaZzJ85yrAwBqJG-jTD9RHKE_8OIhFvQLWl5Z4", "content": "", "creation_timestamp": "2023-06-03T04:34:41.000000Z"}, {"uuid": "a363901a-8852-4b9d-a04e-7260a078b1d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/cibsecurity/60683", "content": "\u203c CVE-2023-20963 \u203c\n\nIn WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:47:39.000000Z"}, {"uuid": "986173cb-daba-483c-a44a-3d9d5133d610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/9475", "content": "#exploit\n1. CVE-2023-20963:\nAndroid: mismatching parcel/unparcel logic for WorkSource\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-20963.html\n2. CVE-2023-36041:\nMicrosoft Excel RCE\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2023-1835", "creation_timestamp": "2023-11-27T12:27:01.000000Z"}, {"uuid": "aedc6483-7938-45f6-84a5-c7de06cf1172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/Rootsec_2/2124", "content": "#exploit\n1. CVE-2023-20963:\nAndroid: mismatching parcel/unparcel logic for WorkSource\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-20963.html\n2. CVE-2023-36041:\nMicrosoft Excel RCE\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2023-1835", "creation_timestamp": "2024-08-16T08:52:59.000000Z"}]}