{"vulnerability": "CVE-2023-38562", "sightings": [{"uuid": "946d1a52-29af-4552-b19a-26f8ca992d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "Telegram/IDySIz3kLOeO_tSHbPFZHedmCwHdGK4r1I2Wwbns2tzZbx_-", "content": "", "creation_timestamp": "2025-02-14T10:05:09.000000Z"}, {"uuid": "911fb278-1042-4243-969c-971ac467277f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4122", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-38562\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-02-20T15:15:08.020\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829\n2. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829", "creation_timestamp": "2025-02-12T19:08:30.000000Z"}, {"uuid": "62608598-5d59-42b1-8b2b-9549511f5d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/arpsyndicate/3773", "content": "#ExploitObserverAlert\n\nCVE-2023-38562\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-38562. A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.", "creation_timestamp": "2024-02-21T13:37:42.000000Z"}, {"uuid": "d54d9e6d-4fde-47d3-87e5-537778a04e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/ctinow/203394", "content": "https://ift.tt/awzDQmi\nCVE-2023-38562 | Weston Embedded uC-TCP-IP 3.06.01 IP Header Loopback Parser double free (TALOS-2023-1829)", "creation_timestamp": "2024-03-08T15:51:41.000000Z"}, {"uuid": "5f4dc2e8-b18d-4638-9ebd-2911a479047e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/ctinow/188680", "content": "https://ift.tt/hONF1qD\nCVE-2023-38562", "creation_timestamp": "2024-02-20T16:37:11.000000Z"}, {"uuid": "797c01a0-5821-467f-9918-b715fcccdf30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38562", "type": "seen", "source": "https://t.me/ctinow/188671", "content": "https://ift.tt/hONF1qD\nCVE-2023-38562", "creation_timestamp": "2024-02-20T16:36:57.000000Z"}]}