{"vulnerability": "CVE-2022-3295", "sightings": [{"uuid": "aa7849fb-b53f-41c3-a8ce-1144caa47fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3295", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17195", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3295\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.4.8.\n\ud83d\udccf Published: 2022-09-26T12:20:10.000Z\n\ud83d\udccf Modified: 2025-05-21T20:28:45.921Z\n\ud83d\udd17 References:\n1. https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233\n2. https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3", "creation_timestamp": "2025-05-21T20:41:36.000000Z"}, {"uuid": "5804e3f2-7219-44dc-97f3-464085b3c7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32953", "type": "seen", "source": "https://t.me/cibsecurity/58207", "content": "\u203c CVE-2022-32953 \u203c\n\nAn issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the SdHostDriver buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated by using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the link data to SMRAM before checking it and verifying that all pointers are within the buffer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-15T07:36:22.000000Z"}, {"uuid": "49433b54-6236-4be8-8419-feb58ca7fc5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32954", "type": "seen", "source": "https://t.me/cibsecurity/58198", "content": "\u203c CVE-2022-32954 \u203c\n\nAn issue was discovered in Insyde InsydeH2O with kernel 5.1 through 5.5. DMA attacks on the SdMmcDevice buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated by using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the link data to SMRAM before checking it and verifying that all pointers are within the buffer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-15T07:36:09.000000Z"}, {"uuid": "47fc1c62-8b1d-4c25-b438-c01b58160deb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32955", "type": "seen", "source": "https://t.me/cibsecurity/58211", "content": "\u203c CVE-2022-32955 \u203c\n\nAn issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the NvmExpressDxe buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated by using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the link data to SMRAM before checking it and verifying that all pointers are within the buffer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-15T07:36:25.000000Z"}, {"uuid": "23f849f9-94c4-4c6d-8d66-199d220bad25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32958", "type": "seen", "source": "https://t.me/cibsecurity/46623", "content": "\u203c CVE-2022-32958 \u203c\n\nA remote attacker with general user privilege can send a message to Teamplus Pro\u00e2\u20ac\u2122s chat group that exceeds message size limit, to terminate other recipients\u00e2\u20ac\u2122 Teamplus Pro chat process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-20T07:41:22.000000Z"}, {"uuid": "ed795644-80d5-4771-bb7f-526de118cc73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32959", "type": "seen", "source": "https://t.me/cibsecurity/46629", "content": "\u203c CVE-2022-32959 \u203c\n\nHiCOS\u00e2\u20ac\u2122 client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for OS information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-20T07:41:31.000000Z"}]}