{"vulnerability": "cve-2023-20664", "sightings": [{"uuid": "f76d5b82-d13d-4329-a211-a2e265e5652c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-20664", "type": "seen", "source": "Telegram/blj6yU0tIYwAWBUJU3jxf9EgHWCBK-xkgQnhdEBWs5z2SxUv", "content": "", "creation_timestamp": "2025-02-14T10:08:09.000000Z"}, {"uuid": "04811843-0901-457e-8bfb-8778f614e860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-20664", "type": "seen", "source": "https://t.me/cibsecurity/61585", "content": "\u203c CVE-2023-20664 \u203c\n\nIn gz, there is a possible double free due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07505952; Issue ID: ALPS07505952.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-06T22:27:19.000000Z"}, {"uuid": "105e696c-b556-43b2-b516-6d2cda5caf8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-20664", "type": "seen", "source": "Telegram/bck8wWR8GBLbgHgggvaLOU8IjPkXKcBEiNyVxBE1B3i8ONeF", "content": "", "creation_timestamp": "2025-02-14T10:06:10.000000Z"}]}