{"vulnerability": "CVE-2022-3213", "sightings": [{"uuid": "82a49d45-2e03-420b-a9c4-f67ac36d58fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-32136", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "5530347b-c1e4-42cf-9d0c-9776bcc0c6d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-32138", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "43fd8a07-1cad-4af7-96a2-27bafae34168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-32137", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "3febe133-0df7-4583-8296-632f87cf3443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-32139", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "626bfacd-a06d-4617-8207-85eac311005f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3213", "type": "seen", "source": "https://t.me/cibsecurity/50082", "content": "\u203c CVE-2022-3213 \u203c\n\nA heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-19T22:38:18.000000Z"}, {"uuid": "72ef9cb0-296a-46b1-8934-0b3a2b1ff3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32137", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6291", "content": "#Threat_Research\n1. Analyzing CVE-2022-22980 to discover a real exploitable path in the source code review process with CodeQL\nhttps://infosecwriteups.com/analyzing-cve-2022-22980-to-discover-a-real-exploitable-path-in-the-source-code-review-process-with-145d97717656\n2. Commonly existing PLC Supply Chain Threats: Multiple critical vulnerabilities in Codesys Runtime (CVE-2022-31805, CVE-2022-31806, CVE-2022-32137)\nhttps://github.com/ic3sw0rd/Codesys_V2_Vulnerability", "creation_timestamp": "2022-06-29T02:51:42.000000Z"}]}