{"vulnerability": "CVE-2022-22491", "sightings": [{"uuid": "c6849702-7fe3-4435-ac99-3bffbe697145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22491", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798805158983707", "content": "", "creation_timestamp": "2025-01-09T14:12:44.003521Z"}, {"uuid": "bd0bff48-35db-4f85-8257-0b500f726b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22491", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcuin3cpi22", "content": "", "creation_timestamp": "2025-01-09T14:15:46.094358Z"}, {"uuid": "4e7e0210-832f-4e00-bf31-6b97f11567ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22491", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfcwm23tkk2e", "content": "", "creation_timestamp": "2025-01-09T14:53:28.182933Z"}, {"uuid": "8b62e052-ede7-4a49-bb42-02648eadd8b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22491", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/953", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-22491\n\ud83d\udd39 Description: IBM App Connect Enterprise Certified Container\u00a07.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, and 12.4 operands running in Red Hat OpenShift do not restrict writing to the local filesystem, which may result in exhausting the available storage in a Pod, resulting in that Pod being restarted.\n\ud83d\udccf Published: 2025-01-09T14:11:28.233Z\n\ud83d\udccf Modified: 2025-01-09T14:11:28.233Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7180500", "creation_timestamp": "2025-01-09T14:15:28.000000Z"}, {"uuid": "d385ba56-7173-43e8-a174-fec3dcf312b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22491", "type": "seen", "source": "https://t.me/cvedetector/14848", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-22491 - IBM App Connect Enterprise Filesystems write vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-22491 \nPublished : Jan. 9, 2025, 2:15 p.m. | 37\u00a0minutes ago \nDescription : IBM App Connect Enterprise Certified Container\u00a07.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, and 12.4 operands running in Red Hat OpenShift do not restrict writing to the local filesystem, which may result in exhausting the available storage in a Pod, resulting in that Pod being restarted. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T16:05:31.000000Z"}]}