{"vulnerability": "CVE-2023-3220", "sightings": [{"uuid": "9f8cf7aa-6437-4a14-b41e-8ff95c805886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32201", "type": "seen", "source": "https://t.me/kasraone_com/317", "content": "\ud83d\udd34 CVE\n\nCVE-2023-32201\n\nStack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution", "creation_timestamp": "2023-06-26T19:19:57.000000Z"}, {"uuid": "01a484fe-4de2-43c0-bc53-b98eab9a411e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32208", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17693", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32208\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Service workers could reveal script base URL due to dynamic `import()`. This vulnerability affects Firefox &lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:30:32.314Z\n\ud83d\udccf Modified: 2025-05-27T16:53:15.666Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1646034\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:49:05.000000Z"}, {"uuid": "9e94febc-d036-4946-a94a-e98fbbf33d7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3220", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7144", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3220\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference.\n\ud83d\udccf Published: 2023-06-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-11T14:28:13.664Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93340e10b9c5fc86730d149636e0aa8b47bb5a34", "creation_timestamp": "2025-03-11T14:39:37.000000Z"}, {"uuid": "a031cbee-d58c-4c88-b283-6a9fa7ad98b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32209", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17692", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32209\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A maliciously crafted favicon could have led to an out of memory crash. This vulnerability affects Firefox &lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:36:11.768Z\n\ud83d\udccf Modified: 2025-05-27T16:53:16.158Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1767194\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:49:04.000000Z"}, {"uuid": "4ae1e4ca-fa6c-4bd6-a172-109d1452836a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32202", "type": "seen", "source": "https://t.me/cibsecurity/69101", "content": "\u203c CVE-2023-32202 \u203c\n\nWalchem Intuition 9 firmware versions prior to v4.21 are vulnerable to improper authentication. Login credentials are stored in a format that could allow an attacker to use them as-is to login and gain access to the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-24T02:12:50.000000Z"}, {"uuid": "1ba9a852-5a4a-421c-bc50-12fe4805c55b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32206", "type": "seen", "source": "https://t.me/cibsecurity/64944", "content": "\u203c CVE-2023-32206 \u203c\n\nAn out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T20:42:40.000000Z"}, {"uuid": "fc3bf2bf-e67e-4d5c-8bf5-79abc48539e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32207", "type": "seen", "source": "https://t.me/cibsecurity/64898", "content": "\u203c CVE-2023-32207 \u203c\n\nA missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T20:36:26.000000Z"}, {"uuid": "18c029bf-500f-47fe-a2f6-ce10590f143d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32205", "type": "seen", "source": "https://t.me/cibsecurity/64940", "content": "\u203c CVE-2023-32205 \u203c\n\nIn multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T20:42:35.000000Z"}]}