{"vulnerability": "CVE-2022-2324", "sightings": [{"uuid": "b0a13c11-6019-4166-ae48-3c98489c54fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23241", "type": "seen", "source": "https://t.me/cibsecurity/51832", "content": "\u203c CVE-2022-23241 \u203c\n\nClustered Data ONTAP versions 9.11.1 through 9.11.1P2 with SnapLock configured FlexGroups are susceptible to a vulnerability which could allow an authenticated remote attacker to arbitrarily modify or delete WORM data prior to the end of the retention period.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T22:15:45.000000Z"}, {"uuid": "2e0e95d3-6130-4f72-9dcd-2cd2ab94def4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23241", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15748", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-23241\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Clustered Data ONTAP versions 9.11.1 through 9.11.1P2 with SnapLock configured FlexGroups are susceptible to a vulnerability which could allow an authenticated remote attacker to arbitrarily modify or delete WORM data prior to the end of the retention period.\n\ud83d\udccf Published: 2022-10-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T14:54:11.754Z\n\ud83d\udd17 References:\n1. https://security.netapp.com/advisory/ntap-20221017-0001/", "creation_timestamp": "2025-05-09T15:25:39.000000Z"}, {"uuid": "0f6a80e8-7f80-4fb5-b846-435ba6c10470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2324", "type": "seen", "source": "https://t.me/cibsecurity/47300", "content": "\u203c CVE-2022-2324 \u203c\n\nImproperly Implemented Security Check vulnerability in the SonicWall Hosted Email Security leads to bypass of Capture ATP security service in the appliance. This vulnerability impacts 10.0.17.7319 and earlier versions\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-30T00:13:57.000000Z"}, {"uuid": "cdbbbb0b-83e3-4ec9-9e03-75bb7c6a2d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23242", "type": "seen", "source": "https://t.me/cibsecurity/39427", "content": "\u203c CVE-2022-23242 \u203c\n\nTeamViewer Linux versions before 15.28 do not properly execute a deletion command for the connection password in case of a process crash. Knowledge of the crash event and the TeamViewer ID as well as either possession of the pre-crash connection password or local authenticated access to the machine would have allowed to establish a remote connection by reusing the not properly deleted connection password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-23T19:28:49.000000Z"}]}