{"vulnerability": "CVE-2022-2318", "sightings": [{"uuid": "3ab14333-2d8a-47cd-82cc-26ce584d1c0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23187", "type": "seen", "source": "https://t.me/cibsecurity/38812", "content": "\u203c CVE-2022-23187 \u203c\n\nAdobe Illustrator version 26.0.3 (and earlier) is affected by a buffer overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Illustrator.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-11T20:15:19.000000Z"}, {"uuid": "4fdef9b0-1007-441d-8e76-0d8c5f51481b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23180", "type": "seen", "source": "https://t.me/ctinow/180028", "content": "https://ift.tt/mf6vNqh\nCVE-2022-23180 | Contact Form &amp; Lead Form Elementor Builder Plugin up to 1.7.3 on WordPress Setting authorization (ID 2670484)", "creation_timestamp": "2024-02-06T14:46:32.000000Z"}, {"uuid": "b8f9ff2d-fd67-4993-a449-795267ff6956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23180", "type": "seen", "source": "https://t.me/ctinow/172923", "content": "https://ift.tt/sJiZguX\nCVE-2022-23180 Exploit", "creation_timestamp": "2024-01-24T17:16:52.000000Z"}, {"uuid": "691d68f4-0418-4082-a978-838b1dee3200", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2318", "type": "seen", "source": "https://t.me/cibsecurity/45697", "content": "\u203c CVE-2022-2318 \u203c\n\nThere are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T22:14:38.000000Z"}, {"uuid": "59efaf25-5082-4c6a-836a-280e4a2fd568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23183", "type": "seen", "source": "https://t.me/cibsecurity/39899", "content": "\u203c CVE-2022-23183 \u203c\n\nMissing authorization vulnerability in Advanced Custom Fields versions prior to 5.12.1 and Advanced Custom Fields Pro versions prior to 5.12.1 allows a remote authenticated attacker to view the information on the database without the access permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-31T12:18:22.000000Z"}, {"uuid": "0f86b53d-80cf-4c85-9745-c9916771640f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23186", "type": "seen", "source": "https://t.me/cibsecurity/37595", "content": "\u203c CVE-2022-23186 \u203c\n\nAdobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-16T20:36:21.000000Z"}, {"uuid": "7c7d099f-276f-4145-9ef1-ed4bd5f55861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23189", "type": "seen", "source": "https://t.me/cibsecurity/37588", "content": "\u203c CVE-2022-23189 \u203c\n\nAdobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-16T20:36:13.000000Z"}, {"uuid": "ea2109ea-2ceb-4e36-acf0-06ee0a580e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23188", "type": "seen", "source": "https://t.me/cibsecurity/37587", "content": "\u203c CVE-2022-23188 \u203c\n\nAdobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a buffer overflow vulnerability due to insecure handling of a crafted malicious file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted malicious file in Illustrator.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-16T20:36:12.000000Z"}]}