{"vulnerability": "cve-2022-3676", "sightings": [{"uuid": "6486ab31-aac0-45e7-a3ae-b5cf400ba129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10530", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-36760\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to.  This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.\n\ud83d\udccf Published: 2023-01-17T19:11:55.106Z\n\ud83d\udccf Modified: 2025-04-04T18:08:02.696Z\n\ud83d\udd17 References:\n1. https://httpd.apache.org/security/vulnerabilities_24.html\n2. https://security.gentoo.org/glsa/202309-01", "creation_timestamp": "2025-04-04T18:36:29.000000Z"}, {"uuid": "cc94691f-eede-40ab-932b-907efc867641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-133-01", "content": "", "creation_timestamp": "2025-05-13T10:00:00.000000Z"}, {"uuid": "5ca96f5f-9e12-4e91-9d85-fde0781fa5bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02", "content": "", "creation_timestamp": "2026-01-27T11:00:00.000000Z"}, {"uuid": "ad717d4d-50d6-4f7d-aebf-54f6f77ac8f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36763", "type": "seen", "source": "https://t.me/ctinow/174233", "content": "https://ift.tt/3jaXOdc\nCVE-2022-36763 | TianoCore EDK2 up to 202311 Tcg2MeasureGptTable heap-based overflow (GHSA-xvv8-66cq-prwr)", "creation_timestamp": "2024-01-26T14:11:04.000000Z"}, {"uuid": "e13e37aa-f3e5-4e68-9c5c-c07f251b1c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "Telegram/Hf_SunJuoYNf_bsQCJ20cuXyI7bzH8EMEXzusn30k3vpXeQ", "content": "", "creation_timestamp": "2024-10-15T10:14:15.000000Z"}, {"uuid": "7470f643-c277-45ae-9b4d-e6751efd667d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3676", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15339", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3676\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.\n\ud83d\udccf Published: 2022-10-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T15:59:25.715Z\n\ud83d\udd17 References:\n1. https://github.com/eclipse-openj9/openj9/pull/16122\n2. https://github.com/eclipse/omr/pull/6773\n3. https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/389", "creation_timestamp": "2025-05-07T16:23:15.000000Z"}, {"uuid": "53116f21-babb-47a5-b4bc-01e9ab2c814e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "Telegram/shGNMT66IqVdbwvO_1SBhU-IDsQ0ajpJW95KIYQIjVVJrhsN", "content": "", "creation_timestamp": "2023-08-10T14:41:21.000000Z"}, {"uuid": "bc7777dd-cf51-4778-b9f8-15d39b2e9e3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "Telegram/qBTHksr0ww0o7AKBF6a5kb8hdQTggsaX26q5tG4_XQIqucEK", "content": "", "creation_timestamp": "2023-08-19T09:10:41.000000Z"}, {"uuid": "c923189c-a7b6-45e4-9df2-0fb8290470f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "https://t.me/arpsyndicate/136", "content": "#ExploitObserverAlert\n\nCVE-2022-36760\n\nDESCRIPTION: Exploit Observer has 9 entries related to CVE-2022-36760. Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to.  This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.\n\nFIRST-EPSS: 0.013020000\nNVD-IS: 6.0\nNVD-ES: 2.2", "creation_timestamp": "2023-11-13T01:14:45.000000Z"}, {"uuid": "8ab9e9d0-b075-49b5-ae3f-aa67068a6f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36765", "type": "seen", "source": "https://t.me/ctinow/174235", "content": "https://ift.tt/x7p62GT\nCVE-2022-36765 | TianoCore EDK2 up to 202311 CreateHob integer overflow to buffer overflow (GHSA-ch4w-v7m3-g8wx)", "creation_timestamp": "2024-01-26T14:11:07.000000Z"}, {"uuid": "4b404fa7-79a7-4edb-9200-e27dff011faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36763", "type": "seen", "source": "https://t.me/ctinow/165151", "content": "https://ift.tt/gbPSVKj\nCVE-2022-36763", "creation_timestamp": "2024-01-09T17:26:57.000000Z"}, {"uuid": "a2179fd5-b0f8-4274-9c10-c27738798fc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36764", "type": "seen", "source": "https://t.me/ctinow/174234", "content": "https://ift.tt/W3rFhbC\nCVE-2022-36764 | TianoCore EDK2 up to 202311 Tcg2MeasurePeImage heap-based overflow (GHSA-4hcq-p8q8-hj8j)", "creation_timestamp": "2024-01-26T14:11:05.000000Z"}, {"uuid": "cded14f9-dcd0-479c-843b-883a47bf3ad5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36763", "type": "seen", "source": "https://t.me/ctinow/165596", "content": "https://ift.tt/hCvNz4b\nCVE-2022-36763", "creation_timestamp": "2024-01-10T08:06:59.000000Z"}, {"uuid": "05a8825f-c280-4fb0-9d5f-05d78bd1206a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36764", "type": "seen", "source": "https://t.me/ctinow/165595", "content": "https://ift.tt/W2lN13Y\nCVE-2022-36764", "creation_timestamp": "2024-01-10T08:06:59.000000Z"}, {"uuid": "f812f334-68c3-429e-8850-fc83f29fe4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36765", "type": "seen", "source": "https://t.me/ctinow/165594", "content": "https://ift.tt/RfZKnhP\nCVE-2022-36765", "creation_timestamp": "2024-01-10T08:06:57.000000Z"}, {"uuid": "2d491329-3fa2-4733-8b60-839a03047cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36765", "type": "seen", "source": "https://t.me/ctinow/165153", "content": "https://ift.tt/0DVWMgK\nCVE-2022-36765", "creation_timestamp": "2024-01-09T17:27:00.000000Z"}, {"uuid": "e1e5866d-86f8-4b2e-98cf-3f299e425678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36764", "type": "seen", "source": "https://t.me/ctinow/165152", "content": "https://ift.tt/nwWN9Ef\nCVE-2022-36764", "creation_timestamp": "2024-01-09T17:26:59.000000Z"}, {"uuid": "2e3edd9f-76bd-4d50-b807-1c1158ec4810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36769", "type": "seen", "source": "https://t.me/cibsecurity/62886", "content": "\u203c CVE-2022-36769 \u203c\n\nIBM Cloud Pak for Data 4.5 and 4.6 could allow a privileged user to upload malicious files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 232034.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-26T07:30:39.000000Z"}, {"uuid": "43ba4492-852d-4375-b0fe-0c813b96df0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36760", "type": "seen", "source": "https://t.me/cibsecurity/56618", "content": "\u203c CVE-2022-36760 \u203c\n\nInconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-17T22:15:38.000000Z"}]}