{"vulnerability": "CVE-2022-2113", "sightings": [{"uuid": "7fac659b-2861-4d74-b0c9-76341d7c2770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2113", "type": "seen", "source": "https://t.me/cibsecurity/44724", "content": "\u203c CVE-2022-2113 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.7.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-17T16:23:34.000000Z"}, {"uuid": "796b304e-97f6-4f93-ac25-b60e0c93b7fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21138", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6aelzgkm22", "content": "", "creation_timestamp": "2025-05-27T17:42:06.740031Z"}, {"uuid": "1a8cad82-e8fc-4f15-a95f-21ce5b36f8ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21131", "type": "seen", "source": "https://t.me/cibsecurity/42509", "content": "\u203c CVE-2022-21131 \u203c\n\nImproper access control for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:36:14.000000Z"}, {"uuid": "1d8a0f0a-83ca-4459-902c-5ad7e33e433f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21136", "type": "seen", "source": "https://t.me/cibsecurity/42496", "content": "\u203c CVE-2022-21136 \u203c\n\nImproper input validation for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable denial of service via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-12T20:35:57.000000Z"}, {"uuid": "ee87a6b5-a255-4a99-987d-a6809cacb217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21133", "type": "seen", "source": "https://t.me/cibsecurity/37147", "content": "\u203c CVE-2022-21133 \u203c\n\nOut-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-10T02:13:28.000000Z"}, {"uuid": "302a8040-7823-40bf-a2b7-58b71a02937f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21132", "type": "seen", "source": "https://t.me/cibsecurity/38709", "content": "\u203c CVE-2022-21132 \u203c\n\nDirectory traversal vulnerability in pfSense-pkg-WireGuard pfSense-pkg-WireGuard 0.1.5 versions prior to 0.1.5_4 and pfSense-pkg-WireGuard 0.1.6 versions prior to 0.1.6_1 allows a remote authenticated attacker to lead a pfSense user to view a file outside the public folder.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-10T20:23:18.000000Z"}, {"uuid": "62b1fa00-8f6d-4894-9bd1-2887862f1152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21134", "type": "seen", "source": "https://t.me/cibsecurity/36504", "content": "\u203c CVE-2022-21134 \u203c\n\nA firmware update vulnerability exists in the &quot;update&quot; firmware checks functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to firmware update. An attacker can send a sequence of requests to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T22:28:07.000000Z"}, {"uuid": "2c8ed90a-710b-4443-a963-9cc7279062a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21137", "type": "seen", "source": "https://t.me/cibsecurity/35600", "content": "\u203c CVE-2022-21137 \u203c\n\nOmron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-14T22:23:41.000000Z"}]}