{"vulnerability": "CVE-2023-3569", "sightings": [{"uuid": "03663bc0-4da3-4c41-978b-696c777cdb44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35692", "type": "seen", "source": "https://t.me/cibsecurity/66739", "content": "\u203c CVE-2023-35692 \u203c\n\nIn getLocationCache of GeoLocation.java, there is a possible way to send a mock location during an emergency call due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T20:28:26.000000Z"}, {"uuid": "512f4aa5-248c-4336-84b2-b279297c269d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3569", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3569\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2  as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.\n\ud83d\udccf Published: 2023-08-08T06:56:40.395Z\n\ud83d\udccf Modified: 2025-02-27T21:10:39.956Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/en/advisories/VDE-2023-017\n2. http://seclists.org/fulldisclosure/2023/Aug/12\n3. http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html", "creation_timestamp": "2025-02-27T21:26:03.000000Z"}, {"uuid": "63471e96-84fd-4a7a-85d7-b6a23954d26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35690", "type": "seen", "source": "https://t.me/ctinow/158966", "content": "https://ift.tt/frLgBDh\nCVE-2023-35690 | Google Android Privilege Escalation", "creation_timestamp": "2023-12-24T09:41:18.000000Z"}, {"uuid": "91514cc0-2639-4914-89c6-d757636efa24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35697", "type": "seen", "source": "https://t.me/cibsecurity/66271", "content": "\u203c CVE-2023-35697 \u203c\n\nImproper Restriction of Excessive Authentication Attempts in the SICK ICR890-4could allow a remote attacker to brute-force user credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-10T20:29:55.000000Z"}, {"uuid": "557c1d27-1748-4067-b005-5dfb8654219e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35696", "type": "seen", "source": "https://t.me/cibsecurity/66283", "content": "\u203c CVE-2023-35696 \u203c\n\nUnauthenticated endpoints in the SICK ICR890-4 could allow an unauthenticatedremote attacker to retrieve sensitive information about the device via HTTP requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-10T20:30:10.000000Z"}]}