{"vulnerability": "CVE-2022-3373", "sightings": [{"uuid": "344b0423-d92d-4190-b614-dcd108831e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33739", "type": "seen", "source": "https://t.me/cibsecurity/44697", "content": "\u203c CVE-2022-33739 \u203c\n\nCA Clarity 15.8 and below and 15.9.0 contain an insecure XML parsing vulnerability that could allow a remote attacker to potentially view the contents of any file on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-17T02:21:55.000000Z"}, {"uuid": "8f25226e-7f87-43d7-8f2a-c2d527fc7c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3373", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14878", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3373\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Out of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)\n\ud83d\udccf Published: 2022-11-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T15:12:05.047Z\n\ud83d\udd17 References:\n1. https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_30.html\n2. https://crbug.com/1366399", "creation_timestamp": "2025-05-05T15:20:02.000000Z"}, {"uuid": "cb2eab99-a8c6-4f38-9734-0d884cd7f300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33736", "type": "seen", "source": "https://t.me/cibsecurity/45974", "content": "\u203c CVE-2022-33736 \u203c\n\nA vulnerability has been identified in Opcenter Quality V13.1 (All versions &lt; V13.1.20220624), Opcenter Quality V13.2 (All versions &lt; V13.2.20220624). The affected applications do not properly validate login information during authentication. This could lead to denial of service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-08T18:05:36.000000Z"}, {"uuid": "8950ddb1-a346-49da-8f47-c13b725b52df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3373", "type": "seen", "source": "https://t.me/cibsecurity/52338", "content": "\u203c CVE-2022-3373 \u203c\n\nOut of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T06:13:28.000000Z"}, {"uuid": "f7055784-5c7c-41ea-b522-d55b5246268f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33734", "type": "seen", "source": "https://t.me/cibsecurity/47656", "content": "\u203c CVE-2022-33734 \u203c\n\nSensitive information exposure in onCharacteristicChanged in Charm by Samsung prior to version 1.2.3 allows attacker to get bluetooth connection information without permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-05T20:27:06.000000Z"}, {"uuid": "d1fa7ac5-3da2-4d22-a7f8-abc3961240b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33732", "type": "seen", "source": "https://t.me/cibsecurity/47655", "content": "\u203c CVE-2022-33732 \u203c\n\nImproper access control vulnerability in Samsung Dex for PC prior to SMR Aug-2022 Release 1 allows local attackers to scan and connect to PC by unprotected binder call.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-05T20:27:05.000000Z"}, {"uuid": "a8364149-3460-417c-b005-1b89dc8d1639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33738", "type": "seen", "source": "https://t.me/cibsecurity/45683", "content": "\u203c CVE-2022-33738 \u203c\n\nOpenVPN Access Server before 2.11 uses a weak random generator used to create user session token for the web portal\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T20:14:35.000000Z"}, {"uuid": "73ed498e-138a-4f30-a22d-d64e7392cd84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33737", "type": "seen", "source": "https://t.me/cibsecurity/45680", "content": "\u203c CVE-2022-33737 \u203c\n\nThe OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T20:14:29.000000Z"}]}