{"vulnerability": "CVE-2022-3646", "sightings": [{"uuid": "3cd650d6-3fd2-40ce-ad72-59378430e2c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36466", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr2o5ww3fu2s", "content": "", "creation_timestamp": "2025-06-08T01:03:26.369903Z"}, {"uuid": "c79fd67f-23e4-422a-a506-de2033c70e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36462", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr2ogveg2l2s", "content": "", "creation_timestamp": "2025-06-08T01:08:26.904472Z"}, {"uuid": "87ae59d6-22f6-4164-bf82-9b38c6654aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3646", "type": "seen", "source": "https://t.me/cibsecurity/51947", "content": "\u203c CVE-2022-3646 \u203c\n\nA vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-21T22:22:47.000000Z"}, {"uuid": "f03da7af-3afd-4784-ab27-da0bc7e86960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36469", "type": "seen", "source": "https://t.me/cibsecurity/48728", "content": "\u203c CVE-2022-36469 \u203c\n\nH3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-25T18:23:32.000000Z"}, {"uuid": "1025d38a-d135-486d-8de4-633b2a7398d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36464", "type": "seen", "source": "https://t.me/cibsecurity/48713", "content": "\u203c CVE-2022-36464 \u203c\n\nTOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the sPort parameter in the function setIpPortFilterRules.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-25T18:23:16.000000Z"}, {"uuid": "78e1369e-6975-422a-8745-39799f957810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36465", "type": "seen", "source": "https://t.me/cibsecurity/48712", "content": "\u203c CVE-2022-36465 \u203c\n\nTOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the pppoeUser parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-25T18:23:15.000000Z"}, {"uuid": "d8975479-fa50-4691-8374-63478fdbefca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36463", "type": "seen", "source": "https://t.me/cibsecurity/48724", "content": "\u203c CVE-2022-36463 \u203c\n\nTOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the command parameter in the function setTracerouteCfg.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-25T18:23:28.000000Z"}]}