{"vulnerability": "CVE-2022-3521", "sightings": [{"uuid": "def29e21-883c-4480-bc9c-4cf727a9c1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35216", "type": "seen", "source": "https://t.me/cibsecurity/47550", "content": "\u203c CVE-2022-35216 \u203c\n\nOMICARD EDM\u00e2\u20ac\u2122s mail image relay function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to by-pass authentication and access arbitrary system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-04T14:19:34.000000Z"}, {"uuid": "616aea24-dd90-407f-becf-65872d8a3f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3521", "type": "seen", "source": "https://t.me/cibsecurity/51531", "content": "\u203c CVE-2022-3521 \u203c\n\nA vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-16T14:30:44.000000Z"}, {"uuid": "875adf06-25a2-457f-b091-eba1049d3744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35212", "type": "seen", "source": "https://t.me/cibsecurity/48407", "content": "\u203c CVE-2022-35212 \u203c\n\nosCommerce2 before v2.3.4.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the function tep_db_error().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-19T00:22:52.000000Z"}, {"uuid": "d483608c-e52a-463e-a915-2328e4b32ad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35218", "type": "seen", "source": "https://t.me/cibsecurity/47427", "content": "\u203c CVE-2022-35218 \u203c\n\nThe NHI card\u00e2\u20ac\u2122s web service component has a heap-based buffer overflow vulnerability due to insufficient validation for packet origin parameter length. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-02T20:18:28.000000Z"}, {"uuid": "3ae33160-f46a-4545-a28f-b76d1048f643", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35217", "type": "seen", "source": "https://t.me/cibsecurity/47424", "content": "\u203c CVE-2022-35217 \u203c\n\nThe NHI card\u00e2\u20ac\u2122s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-02T20:18:22.000000Z"}, {"uuid": "bbf9c3ec-8293-4712-9d56-c5c679c78f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35219", "type": "seen", "source": "https://t.me/cibsecurity/47425", "content": "\u203c CVE-2022-35219 \u203c\n\nThe NHI card\u00e2\u20ac\u2122s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet key parameter. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-02T20:18:24.000000Z"}]}