{"vulnerability": "CVE-2022-31647", "sightings": [{"uuid": "8aec5f31-0483-488d-8c27-6be2229a238e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31647", "type": "seen", "source": "https://t.me/cibsecurity/63013", "content": "\u203c CVE-2022-34292 \u203c\n\nDocker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-28T00:26:44.000000Z"}, {"uuid": "62d14120-b60a-4b64-b5a6-f69dcff591f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31647", "type": "seen", "source": "https://t.me/cibsecurity/63017", "content": "\u203c CVE-2022-31647 \u203c\n\nDocker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-28T00:26:51.000000Z"}]}