{"vulnerability": "cve-2022-36537", "sightings": [{"uuid": "626584c8-6455-46ff-bc97-093368a22a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "29801f92-1ad7-491a-8840-a4b7af9549f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "51fe1482-d8d5-4026-9c1b-78093f012bc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "ea28fa09-c52f-4126-9d23-a7f918d08621", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "c6e018b4-0e4d-4bf1-b3d8-f18b5db37e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "3081eca2-5ef0-4a4b-9b3a-704b6ac48d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "dc6fcd4b-dc18-4d59-8bdd-eba54b905f6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "541d968d-4d60-4292-b15b-eb9d82739e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "f878e76d-f8c6-49a4-a19e-d728ed655368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "fb386e39-3817-4520-ab38-cb1dea892361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "2d05d22d-5b50-4e2e-8fce-672ff9fa290c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "f97475c1-393b-40df-88a5-1ede099c3cbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "cdbb7990-b684-427e-b63c-00515ff2d4a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "783d2e03-59c1-4d40-8588-8dffec177749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://sploitus.com/exploit?id=E8F714E1-8287-5F9C-B58E-69B886215313&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-27T23:11:02.000000Z"}, {"uuid": "79005e0d-4cdd-4564-9c5d-397816c65564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5510a0ae-1519-4965-bf9f-60ccf00a8d0d", "content": "", "creation_timestamp": "2026-02-02T12:27:04.511055Z"}, {"uuid": "96e618f0-f100-47bd-be33-4c7d18a1e552", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "exploited", "source": "https://t.me/BleepingComputer/15661", "content": "Latest news and stories from BleepingComputer.com\nCISA warns of hackers exploiting ZK Java Framework RCE flaw\n\nThe U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) has added CVE-2022-36537 to its \"Known Exploited Vulnerabilities Catalog\" after threat actors began\u00a0actively exploiting the remote code execution (RCE) flaw in attacks. [...]", "creation_timestamp": "2023-03-01T00:50:07.000000Z"}, {"uuid": "ecccd333-e82e-47f1-943b-0191615b70aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1744", "content": "#exploit\n1. Exploiting CVE-2022-42703 - Bringing back the stack attack\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html\n\n2. CVE-2022-36537:\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT", "creation_timestamp": "2022-12-13T04:12:35.000000Z"}, {"uuid": "fccecedc-e580-4335-828d-0e59eb17a638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3582", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPOC of CVE-2022-36537\nURL\uff1ahttps://github.com/Malwareman007/CVE-2022-36537\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-12-09T14:25:09.000000Z"}, {"uuid": "47dead01-75b1-422f-a7a3-d0dcc9071c98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3580", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-36537\nURL\uff1ahttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-12-09T12:28:21.000000Z"}, {"uuid": "d6303c59-d7c4-4834-b080-bc6fde89120a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/3436", "content": "\u200b\u200bCVE-2022-25765 \n\npdfkit Exploit Reverse Shell\n\npdfkit &lt;0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765\n\nhttps://github.com/CyberArchitect1/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell\n\n\u200b\u200bCVE-2022-45025\n\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\n\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n\u200b\u200bCVE-2022-36537\n\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\n\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT\n\n\u200b\u200bCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bCVE-2022-45771 - Pwndoc LFI to RCE\n\nPwndoc local file inclusion to remote code execution of Node.js code on the server.\n\nhttps://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE\n\n\u200b\u200bCVE-2022-46169\n\nCacti remote_agent.php Unauthenticated Command Injection.\n\nhttps://github.com/0xf4n9x/CVE-2022-46169\n\n\u200b\u200bCVE-2022-45451\n\nPoC for CVE-2022-45451 Acronis Arbitrary File Read\n\nhttps://github.com/alfarom256/CVE-2022-45451\n\nCVE-2022-28672\n\nThis bug was Use after Free caused by improper handling of javascript object memory references.\n\nhttps://github.com/hacksysteam/CVE-2022-28672\n\nUse after Free - RCE Exploit: https://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n\n\u200b\u200bCVE-2003-0358\n\nBuffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges &gt; via a long -s command line option.\n\nhttps://github.com/snowcra5h/CVE-2003-0358\n\n\u200b\u200bCVE-2022-39253\n\nDocker host file read\n\nhttps://github.com/ssst0n3/docker-cve-2022-39253-poc\n\n\u200b\u200bCVE-2022-48870\n\nmaccms admin+ xss attacks\n\nhttps://github.com/Cedric1314/CVE-2022-48870\n\n\u200b\u200bCVE-2022-2602\n\nPoC Kernel Privilege Escalation Linux\n\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n\u200b\u200bEvilWfshbr\n\nCVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation\n\nhttps://github.com/kkent030315/CVE-2022-42046\n\n\u200b\u200bCVE-2022-2602\n\nThis repository contains exploits for CVE-2022-2602. There are two versions of it:\n\n\u25ab\ufe0f Exploit using userfaultfd technique.\n\u25ab\ufe0f Exploit using inode locking technique.\n\nhttps://github.com/LukeGix/CVE-2022-2602\n\n#cve #poc \n@pfkgit", "creation_timestamp": "2023-01-28T19:14:38.000000Z"}, {"uuid": "e4980f31-833b-40b4-92fc-2b36c063480e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "exploited", "source": "https://t.me/hackprotectsi/460", "content": "https://www.rapid7.com/blog/post/2023/03/01/etr-active-exploitation-of-zk-framework-cve-2022-36537/?utm_campaign=sm-blog-etr&amp;utm_source=twitter&amp;utm_medium=organic-social", "creation_timestamp": "2023-03-02T08:51:53.000000Z"}, {"uuid": "fbab4f5c-d22c-48c7-bc2d-5f1f2eea6053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "exploited", "source": "https://t.me/information_security_channel/49612", "content": "R1Soft Server Backup Manager Vulnerability Exploited to Deploy Backdoor\nhttps://www.securityweek.com/r1soft-server-backup-manager-vulnerability-exploited-to-deploy-backdoor/\n\nHackers have been exploiting a vulnerability tracked as CVE-2022-36537 to hack hundreds of R1Soft servers. \nThe post R1Soft Server Backup Manager Vulnerability Exploited to Deploy Backdoor (https://www.securityweek.com/r1soft-server-backup-manager-vulnerability-exploited-to-deploy-backdoor/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-02-22T21:19:18.000000Z"}, {"uuid": "f8f18cf0-ec54-4ab4-ac81-c2122ca3b7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "1142a1f1-ce73-4eca-84b8-7c5a28e6039c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971771", "content": "", "creation_timestamp": "2024-12-24T20:33:52.114929Z"}, {"uuid": "c2d64af2-d808-4d4f-8b52-bd50d884df24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5510a0ae-1519-4965-bf9f-60ccf00a8d0d", "content": "", "creation_timestamp": "2026-02-02T12:27:04.511055Z"}, {"uuid": "b6a56a7e-cfec-4a88-b9fb-50a8841a613c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "Telegram/636bdVh62ZVl1LY4YdnSMFOrBMSYBKPt91OO-XzMtes2OkY", "content": "", "creation_timestamp": "2025-09-28T03:00:10.000000Z"}, {"uuid": "b5b3f07a-69d4-4e02-b9e0-edf86ef5b68f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "exploited", "source": "https://t.me/BleepingComputer/15660", "content": "\u200aCISA warns of hackers exploiting ZK Java Framework RCE flaw\n\nThe U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) has added CVE-2022-36537 to its \"Known Exploited Vulnerabilities Catalog\" after threat actors began\u00a0actively exploiting the remote code execution (RCE) flaw in attacks. [...]\n\nhttps://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/", "creation_timestamp": "2023-02-28T23:06:03.000000Z"}, {"uuid": "3b1623f8-2036-47b3-ae85-6c7f0fefbc39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://t.me/arpsyndicate/1395", "content": "#ExploitObserverAlert\n\nCVE-2022-36537\n\nDESCRIPTION: Exploit Observer has 28 entries related to CVE-2022-36537. ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader.\n\nFIRST-EPSS: 0.928620000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-05T05:06:35.000000Z"}, {"uuid": "8233a769-ddf9-4b5c-9b60-cef3bec7e8ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/627", "content": "CVE-2022-36537 : ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 &amp; 8.6.4.1- Authentication Bypass\nConnectWise Recover &lt;= v2.9.7 &amp; R1Soft Server Backup Manager &lt;=  v6.16.3 - Remote Code Execution\nPOC : https://github.com/agnihackers/CVE-2022-36537-EXPLOIT", "creation_timestamp": "2022-12-17T21:29:02.000000Z"}, {"uuid": "0809d49b-fe0c-42dc-812a-62f0f6ce2d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://t.me/cibsecurity/48923", "content": "\u203c CVE-2022-36537 \u203c\n\nZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-27T00:30:26.000000Z"}, {"uuid": "5a83fff3-41f9-45ed-a11e-c10d23dac1e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://t.me/thehackernews/2720", "content": "A critical vulnerability (CVE-2022-36537) has been reported and patched in ConnectWise R1Soft Server Backup Manager software that could lead to remote code execution and supply chain attacks.\n\nRead: https://thehackernews.com/2022/11/critical-rce-vulnerability-reported-in.html", "creation_timestamp": "2022-11-01T12:31:11.000000Z"}, {"uuid": "1f30d043-9c81-48b0-b897-5e0e4948d885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7335", "content": "#exploit\n1. Exploiting CVE-2022-42703 - Bringing back the stack attack\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html\n\n2. CVE-2022-36537:\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT", "creation_timestamp": "2022-12-12T05:57:24.000000Z"}, {"uuid": "8d9ad9dc-88ef-40b8-a8fd-36e564917a71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:38.000000Z"}, {"uuid": "4f6b3dda-99d6-40a7-979b-87502a3da8bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36537", "type": "seen", "source": "https://bsky.app/profile/c1b3r53cur1ty.bsky.social/post/3ln55hailza2b", "content": "", "creation_timestamp": "2025-04-19T03:01:37.564941Z"}]}