{"vulnerability": "CVE-2022-3463", "sightings": [{"uuid": "a7c0ecf8-0884-46d0-b7bd-f24a3a739e15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34636", "type": "seen", "source": "https://t.me/cibsecurity/46523", "content": "\u203c CVE-2022-34636 \u203c\n\nCVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMA violation occurs during address translation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:40:04.000000Z"}, {"uuid": "0d6d6d14-41b9-4ea8-884a-ab9c0191aa87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34632", "type": "seen", "source": "https://t.me/cibsecurity/46521", "content": "\u203c CVE-2022-34632 \u203c\n\nRocket-Chip commit 4f8114374d8824dfdec03f576a8cd68bebce4e56 was discovered to contain insufficient cryptography via the component /rocket/RocketCore.scala.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:39:59.000000Z"}, {"uuid": "0d368c31-f4e6-43ff-a635-3ef4a2950bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34634", "type": "seen", "source": "https://t.me/cibsecurity/46520", "content": "\u203c CVE-2022-34634 \u203c\n\nCVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted det instructions rather create an exception.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:39:58.000000Z"}, {"uuid": "e5fe74e7-5fa4-4579-9546-daa89f2468a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34639", "type": "seen", "source": "https://t.me/cibsecurity/46519", "content": "\u203c CVE-2022-34639 \u203c\n\nCVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a treats non-standard fence instructions as illegal which can affect the function of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:39:57.000000Z"}, {"uuid": "414ea94e-afd4-4ca2-a316-18fac764814f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3463", "type": "seen", "source": "https://t.me/cibsecurity/52586", "content": "\u203c CVE-2022-3463 \u203c\n\nThe Contact Form Plugin WordPress plugin before 4.3.13 does not validate and escape fields when exporting form entries as CSV, leading to a CSV injection\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-07T14:02:43.000000Z"}, {"uuid": "5e8778da-1ff3-4eae-86f5-30a716a6261e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34635", "type": "seen", "source": "https://t.me/cibsecurity/46527", "content": "\u203c CVE-2022-34635 \u203c\n\nThe mstatus.sd field in CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a does not update when the mstatus.fs field is set to Dirty.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:40:09.000000Z"}, {"uuid": "0f2bf44d-20b3-4ccb-96b5-8370c8965fcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34637", "type": "seen", "source": "https://t.me/cibsecurity/46524", "content": "\u203c CVE-2022-34637 \u203c\n\nCVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a implements an incorrect exception type when an illegal virtual address is loaded.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:40:04.000000Z"}, {"uuid": "e28946cb-317e-4527-8470-12ddcdb8ec5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34633", "type": "seen", "source": "https://t.me/cibsecurity/46525", "content": "\u203c CVE-2022-34633 \u203c\n\nCVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted sfence.vma instructions rather create an exception.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T02:40:06.000000Z"}]}