{"vulnerability": "CVE-2022-3667", "sightings": [{"uuid": "a57de193-ace8-4494-8803-cff0aaab501e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36670", "type": "seen", "source": "https://t.me/cibsecurity/49343", "content": "\u203c CVE-2022-36670 \u203c\n\nPCProtect Endpoint prior to v5.17.470 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-06T22:13:33.000000Z"}, {"uuid": "1c3c8bd7-9fb5-4d4a-8c83-aa9abab6e68b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36678", "type": "seen", "source": "https://t.me/cibsecurity/48848", "content": "\u203c CVE-2022-36678 \u203c\n\nSimple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_category.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T16:29:55.000000Z"}, {"uuid": "3f950b3c-14c0-4f72-bb8a-9ed8b65c0158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36679", "type": "seen", "source": "https://t.me/cibsecurity/48857", "content": "\u203c CVE-2022-36679 \u203c\n\nSimple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T16:30:13.000000Z"}]}