{"vulnerability": "CVE-2022-3563", "sightings": [{"uuid": "88252d57-4d58-49dd-b689-61609e9cb4a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3563", "type": "seen", "source": "https://t.me/cibsecurity/51622", "content": "\u203c CVE-2022-3563 \u203c\n\nA vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T22:13:19.000000Z"}, {"uuid": "7ac8b055-3980-469f-a42b-3b37460e558e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35639", "type": "seen", "source": "https://t.me/cibsecurity/46996", "content": "\u203c CVE-2022-35639 \u203c\n\nIBM Sterling Partner Engagement Manager 6.1, 6.2, and Cloud 22.2 do not limit the length of a connection which could cause the server to become unresponsive. IBM X-Force ID: 230932.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-26T18:35:00.000000Z"}, {"uuid": "e053be89-29ba-465f-b9a1-2945c07eb16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35632", "type": "seen", "source": "https://t.me/cibsecurity/47266", "content": "\u203c CVE-2022-35632 \u203c\n\nThe Velociraptor GUI contains an editor suggestion feature that can display the description field of a VQL function, plugin or artifact. This field was not properly sanitized and can lead to cross-site scripting (XSS). This issue was resolved in Velociraptor 0.6.5-2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-29T20:13:41.000000Z"}, {"uuid": "8b919be0-7182-44e3-b423-3c886269024c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35631", "type": "seen", "source": "https://t.me/cibsecurity/47273", "content": "\u203c CVE-2022-35631 \u203c\n\nOn MacOS and Linux, it may be possible to perform a symlink attack by replacing this predictable file name with a symlink to another file and have the Velociraptor client overwrite the other file. This issue was resolved in Velociraptor 0.6.5-2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-29T20:13:49.000000Z"}, {"uuid": "f4a54834-579b-4d90-9eeb-2a2cb2d1716b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35630", "type": "seen", "source": "https://t.me/cibsecurity/47271", "content": "\u203c CVE-2022-35630 \u203c\n\nA cross-site scripting (XSS) issue in generating a collection report made it possible for malicious clients to inject JavaScript code into the static HTML file. This issue was resolved in Velociraptor 0.6.5-2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-29T20:13:47.000000Z"}]}