{"vulnerability": "CVE-2023-3856", "sightings": [{"uuid": "de1cebb0-8689-42d9-9bfa-b03e93278b3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38566", "type": "seen", "source": "https://t.me/ctinow/201397", "content": "https://ift.tt/f8VzKAq\nCVE-2023-38566 | Intel ISPC software prior 1.21.0 uncontrolled search path (intel-sa-00994)", "creation_timestamp": "2024-03-06T14:41:25.000000Z"}, {"uuid": "911fb278-1042-4243-969c-971ac467277f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4122", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-38562\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-02-20T15:15:08.020\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829\n2. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829", "creation_timestamp": "2025-02-12T19:08:30.000000Z"}, {"uuid": "946d1a52-29af-4552-b19a-26f8ca992d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "Telegram/IDySIz3kLOeO_tSHbPFZHedmCwHdGK4r1I2Wwbns2tzZbx_-", "content": "", "creation_timestamp": "2025-02-14T10:05:09.000000Z"}, {"uuid": "62608598-5d59-42b1-8b2b-9549511f5d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/arpsyndicate/3773", "content": "#ExploitObserverAlert\n\nCVE-2023-38562\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-38562. A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.", "creation_timestamp": "2024-02-21T13:37:42.000000Z"}, {"uuid": "d54d9e6d-4fde-47d3-87e5-537778a04e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/ctinow/203394", "content": "https://ift.tt/awzDQmi\nCVE-2023-38562 | Weston Embedded uC-TCP-IP 3.06.01 IP Header Loopback Parser double free (TALOS-2023-1829)", "creation_timestamp": "2024-03-08T15:51:41.000000Z"}, {"uuid": "f68937f2-bc23-4d2e-aa04-0a925f5bff45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38561", "type": "seen", "source": "https://t.me/ctinow/201396", "content": "https://ift.tt/h7EwtxC\nCVE-2023-38561 | Intel XTU Software prior 7.12.0.29 access control (intel-sa-00955)", "creation_timestamp": "2024-03-06T14:41:24.000000Z"}, {"uuid": "5f4dc2e8-b18d-4638-9ebd-2911a479047e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/ctinow/188680", "content": "https://ift.tt/hONF1qD\nCVE-2023-38562", "creation_timestamp": "2024-02-20T16:37:11.000000Z"}, {"uuid": "692bdf2d-63d0-49e9-bbfc-64d42a657c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38561", "type": "seen", "source": "https://t.me/ctinow/184812", "content": "https://ift.tt/4qaTUSc\nCVE-2023-38561", "creation_timestamp": "2024-02-14T17:03:06.000000Z"}, {"uuid": "797c01a0-5821-467f-9918-b715fcccdf30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/ctinow/188671", "content": "https://ift.tt/hONF1qD\nCVE-2023-38562", "creation_timestamp": "2024-02-20T16:36:57.000000Z"}, {"uuid": "0876bd34-67ce-4488-b7f0-31cef97cfb07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38568", "type": "seen", "source": "https://t.me/cibsecurity/69981", "content": "\u203c CVE-2023-38568 \u203c\n\nArcher A10 firmware versions prior to 'Archer A10(JP)_V2_230504' allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T14:17:45.000000Z"}, {"uuid": "d4f99f08-6960-48bb-ab04-07cc474dfbb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38563", "type": "seen", "source": "https://t.me/cibsecurity/69982", "content": "\u203c CVE-2023-38563 \u203c\n\nArcher C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T14:17:46.000000Z"}, {"uuid": "d12f83cc-6283-4b28-b8af-f9367a2fa63d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38569", "type": "seen", "source": "https://t.me/cibsecurity/69849", "content": "\u203c CVE-2023-38569 \u203c\n\nStored cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T14:16:56.000000Z"}, {"uuid": "460f3293-44f2-452e-b6e8-987a6f2ccbbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3856", "type": "seen", "source": "https://t.me/cibsecurity/67135", "content": "\u203c CVE-2023-3856 \u203c\n\nA vulnerability, which was classified as problematic, has been found in phpscriptpoint Ecommerce 1.15. Affected by this issue is some unknown functionality of the file /blog-single.php. The manipulation of the argument slug leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235208. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-24T07:25:45.000000Z"}, {"uuid": "b66e52fe-d643-4dba-9cae-cb8650523eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38560", "type": "seen", "source": "https://t.me/cibsecurity/67537", "content": "\u203c CVE-2023-38560 \u203c\n\nAn integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-01T20:38:44.000000Z"}]}