{"vulnerability": "cve-2022-44517", "sightings": [{"uuid": "1c974984-6f0c-454f-b533-2e3b3c91d09a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44517", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113676434984057405", "content": "", "creation_timestamp": "2024-12-18T23:32:23.385815Z"}, {"uuid": "fbc64f1d-2695-4c08-a9a1-9249101157da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44517", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:04.000000Z"}, {"uuid": "34ae286e-4684-41d2-9703-7673d9c64fc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44517", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "b9e1751f-8679-4312-9ee4-88026343f395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44517", "type": "seen", "source": "https://t.me/cvedetector/13292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-44517 - Adobe Acrobat Reader DC Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-44517 \nPublished : Dec. 19, 2024, 12:15 a.m. | 38\u00a0minutes ago \nDescription : Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T02:15:26.000000Z"}]}