{"vulnerability": "CVE-2022-3623", "sightings": [{"uuid": "3a1cd92c-6abc-4654-bc1d-93dffabcbf74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3623", "type": "seen", "source": "https://t.me/cibsecurity/51901", "content": "\u203c CVE-2022-3623 \u203c\n\nA vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-21T00:21:44.000000Z"}, {"uuid": "831c390d-46f2-4879-8331-c872ed5150a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36231", "type": "seen", "source": "https://t.me/cibsecurity/58832", "content": "\u203c CVE-2022-36231 \u203c\n\npdf_info 0.5.3 is vulnerable to Command Execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-24T00:48:38.000000Z"}, {"uuid": "214deec4-4b84-4091-9656-0301f0704fbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36231", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/547", "content": "\u200b\u200bCVE-2022-36231\n\nThe ruby gem pdf_info &lt;= 0.5.3 is vulnerable to OS Command Injection when executing a method on a PDF::Info object.\n\nAn attacker using a specially crafted payload may execute OS commands by using command chaining.\n\nhttps://github.com/affix/CVE-2022-36231\n\n#cve", "creation_timestamp": "2022-11-28T19:07:22.000000Z"}]}