{"vulnerability": "CVE-2022-3664", "sightings": [{"uuid": "2d0c30d9-f6a5-4a57-8ce8-9a0ffe4aa778", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36648", "type": "seen", "source": "https://t.me/cibsecurity/69020", "content": "\u203c CVE-2022-36648 \u203c\n\nThe hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device model in QEMU, as used in 7.0.0 and earlier, allows remote attackers to crash the host qemu and potentially execute code on the host via execute a malformed program in the guest OS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-22T22:28:06.000000Z"}, {"uuid": "73300d84-dea9-4521-b690-ca58d2795926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36647", "type": "seen", "source": "https://t.me/cibsecurity/49264", "content": "\u203c CVE-2022-36647 \u203c\n\nPKUVCL davs2 v1.6.205 was discovered to contain a global buffer overflow via the function parse_sequence_header() at source/common/header.cc:269.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-03T02:39:36.000000Z"}, {"uuid": "06766e65-4622-4d15-b543-18090f5e196f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36642", "type": "seen", "source": "https://t.me/cibsecurity/49263", "content": "\u203c CVE-2022-36642 \u203c\n\nA local file disclosure vulnerability in /appConfig/userDB.json of Telos Alliance Omnia MPX Node through 1.5.0+r1 allows attackers to escalate privileges to root and execute arbitrary commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-03T02:39:36.000000Z"}]}