{"vulnerability": "CVE-2022-2017", "sightings": [{"uuid": "1c6a4b67-eacd-477d-b036-00b94a4a7d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2017", "type": "seen", "source": "https://t.me/cibsecurity/44134", "content": "\u203c CVE-2022-2017 \u203c\n\nA vulnerability was found in SourceCodester Prison Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pms/admin/visits/view_visit.php of the component Visit Handler. The manipulation of the argument id with the input 2%27and%201=2%20union%20select%201,2,3,4,5,6,7,user(),database()--+ leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-09T20:33:50.000000Z"}, {"uuid": "a4bc69d5-c1e7-4bcc-bc79-e53ba8c46d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20170", "type": "seen", "source": "https://t.me/cibsecurity/44503", "content": "\u203c CVE-2022-20170 \u203c\n\nProduct: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:19.000000Z"}, {"uuid": "5ff777ba-9993-47fb-9d7e-dc27267a6ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20175", "type": "seen", "source": "https://t.me/cibsecurity/44507", "content": "\u203c CVE-2022-20175 \u203c\n\nProduct: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:25.000000Z"}, {"uuid": "3876a689-d27e-48a0-9110-18d40ba69ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20177", "type": "seen", "source": "https://t.me/cibsecurity/44506", "content": "\u203c CVE-2022-20177 \u203c\n\nProduct: AndroidVersions: Android kernelAndroid ID: A-209906686References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:24.000000Z"}, {"uuid": "f01b2cf7-4b52-4c0a-9d0e-21c6fae0af50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20176", "type": "seen", "source": "https://t.me/cibsecurity/44504", "content": "\u203c CVE-2022-20176 \u203c\n\nIn auth_store of sjtag-driver.c, there is a possible read of uninitialized memory due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-197787879References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:19.000000Z"}, {"uuid": "9898340d-6e6b-4aa8-aea8-a30e3bdbee7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20179", "type": "seen", "source": "https://t.me/cibsecurity/44517", "content": "\u203c CVE-2022-20179 \u203c\n\nProduct: AndroidVersions: Android kernelAndroid ID: A-211683760References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:41.000000Z"}, {"uuid": "539ca803-f534-4e63-92a5-98641f369940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20174", "type": "seen", "source": "https://t.me/cibsecurity/44516", "content": "\u203c CVE-2022-20174 \u203c\n\nIn exynos_secEnv_init of mach-gs101.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210847407References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:40.000000Z"}, {"uuid": "9de6da7f-674f-4ffd-8e15-5d81a220ff21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20172", "type": "seen", "source": "https://t.me/cibsecurity/44512", "content": "\u203c CVE-2022-20172 \u203c\n\nIn onbind of ShannonRcsService.java, there is a possible access to protect data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206987222References: N/A\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T18:20:33.000000Z"}]}