{"vulnerability": "CVE-2022-36946", "sightings": [{"uuid": "3dcff94e-78d7-4900-bc88-2725f2f7613e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "published-proof-of-concept", "source": "Telegram/YjKpElwTJat5Aq_lfKrAVMyhbkP1TPHcJvHlgb34kY9eI0s", "content": "", "creation_timestamp": "2022-07-30T12:27:47.000000Z"}, {"uuid": "f7f6df41-fe26-4923-8d5c-fa332a072ef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2833", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-36946 linux kernel panic in netfilter_queue \nURL\uff1ahttps://github.com/XmasSnowISBACK/CVE-2022-36946\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-02T18:58:15.000000Z"}, {"uuid": "05bdd9ab-930b-4366-b9ca-cf67e1b7014b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2796", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-36946 linux kernel panic in netfilter_queue\nURL\uff1ahttps://github.com/Pwnzer0tt1/CVE-2022-36946\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-28T19:50:46.000000Z"}, {"uuid": "306bfb00-a922-47aa-a6a6-7a784b5d2245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14900", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-36946\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-&gt;len.\n\ud83d\udccf Published: 2022-07-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T16:13:27.647Z\n\ud83d\udd17 References:\n1. https://marc.info/?l=netfilter-devel&amp;m=165883202007292&amp;w=2\n2. https://www.debian.org/security/2022/dsa-5207\n3. https://security.netapp.com/advisory/ntap-20220901-0007/\n4. https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html\n5. https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html\n6. https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", "creation_timestamp": "2025-05-05T16:19:48.000000Z"}, {"uuid": "8f6fe827-185e-4848-93e3-ac9b47b24a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "published-proof-of-concept", "source": "Telegram/K-NdsruMw1Fym1ldoCgIBSKfSnuSwSHmNQJK0ReNQEl6Hw", "content": "", "creation_timestamp": "2022-08-01T15:43:03.000000Z"}, {"uuid": "4795f3a2-b487-49cc-be76-c765c12e9930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "seen", "source": "https://t.me/cibsecurity/47128", "content": "\u203c CVE-2022-36946 \u203c\n\nnfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-&gt;len.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-28T00:36:40.000000Z"}, {"uuid": "a16842d6-844f-4f1a-bdd1-bf6635ebfacc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/914", "content": "Updates On Hackbyte Forum:-\n\n1. Erebus - Fast and customisable parameter based vulnerability scanner based on simple YAML Rules\n2. Zeratool - Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems\n3. CVE-2022-36946 linux kernel panic in netfilter_queue\n4. CVE-2022-32744: Critical Samba admin password reset flaw\n5. aif_ru Leak\n6. Exactis Company Leak\n7. paidleaf.co_68K Leak\n8. CVE-2022-26712: The POC for SIP-Bypass\n9. CVE-2022-26138: Confluence Hardcoded Password POC\n10. Blizzard-Jailbreak-9: Blizzard Jailbreak for iOS 9.0 - 9.3.6, 32-Bit\n11. Quasar: Remote Administration Tool for Windows\n12. pochta Leak\n13. COINPAYEX.LTD Data Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-24T11:48:28.000000Z"}, {"uuid": "ce8a38c6-e12c-4ec6-b16c-08645777dd8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36946", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6491", "content": "#exploit\n1. CVE-2022-36946:\nLinux kernel panic in netfilter_queue\nhttps://github.com/Pwnzer0tt1/CVE-2022-36946\n\n2. CVE-2022-29593:\nAuthentication Bypass by Capture Replay (Dingtian-DT-R002)\nhttps://github.com/9lyph/CVE-2022-29593", "creation_timestamp": "2022-07-30T15:50:42.000000Z"}]}