{"vulnerability": "CVE-2022-37434", "sightings": [{"uuid": "52f24e57-090d-4400-bb60-07e04653a3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37434", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "e45ff730-95be-4547-b7b8-626702b5656f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37434", "type": "seen", "source": "https://t.me/arpsyndicate/2003", "content": "#ExploitObserverAlert\n\nCVE-2022-37434\n\nDESCRIPTION: Exploit Observer has 54 entries related to CVE-2022-37434. zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n\nFIRST-EPSS: 0.004010000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T14:34:33.000000Z"}, {"uuid": "cd08dfd4-ee2a-4a22-9f62-5f659244ff95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37434", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14523", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37434\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n\ud83d\udccf Published: 2022-08-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T17:08:24.912Z\n\ud83d\udd17 References:\n1. https://github.com/ivd38/zlib_overflow\n2. https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1\n3. https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063\n4. https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764\n5. http://www.openwall.com/lists/oss-security/2022/08/05/2\n6. https://github.com/curl/curl/issues/9271\n7. http://www.openwall.com/lists/oss-security/2022/08/09/1\n8. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/\n9. https://www.debian.org/security/2022/dsa-5218\n10. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/\n11. https://security.netapp.com/advisory/ntap-20220901-0005/\n12. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/\n13. https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html\n14. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/\n15. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/\n16. https://support.apple.com/kb/HT213489\n17. https://support.apple.com/kb/HT213488\n18. https://support.apple.com/kb/HT213494\n19. https://support.apple.com/kb/HT213493\n20. https://support.apple.com/kb/HT213491\n21. https://support.apple.com/kb/HT213490\n22. http://seclists.org/fulldisclosure/2022/Oct/41\n23. http://seclists.org/fulldisclosure/2022/Oct/38\n24. http://seclists.org/fulldisclosure/2022/Oct/37\n25. http://seclists.org/fulldisclosure/2022/Oct/42\n26. https://security.netapp.com/advisory/ntap-20230427-0007/\n27. https://github.com/madler/zlib/commit/1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d", "creation_timestamp": "2025-05-02T17:16:23.000000Z"}, {"uuid": "c50b8e64-89ff-4f53-858c-16adb67faca4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37434", "type": "seen", "source": "https://t.me/ctinow/182188", "content": "https://ift.tt/7cX1zxW\nCVE-2022-37434 | Oracle JD Edwards EnterpriseOne Tools Prior to 9.2.8.0 Interactive Engine SEC out-of-bounds write", "creation_timestamp": "2024-02-09T18:26:37.000000Z"}, {"uuid": "ae51f955-8522-4d81-b597-9326a2fd0ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37434", "type": "seen", "source": "https://t.me/ctinow/182036", "content": "https://ift.tt/Sde3EbJ\nCVE-2022-37434 | Oracle Hyperion Financial Management 11.2.14.0.000 Security out-of-bounds write", "creation_timestamp": "2024-02-09T14:27:14.000000Z"}, {"uuid": "699cd675-8650-4f71-9441-41f78da2386c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37434", "type": "seen", "source": "https://t.me/cibsecurity/47601", "content": "\u203c CVE-2022-37434 \u203c\n\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-05T12:20:27.000000Z"}]}