{"vulnerability": "CVE-2022-2988", "sightings": [{"uuid": "ec4d64c1-cde1-421c-be0d-fd4aa2c21074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2615", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aApache Tomcat DoS (CVE-2022-29885) Exploit\nURL\uff1ahttps://github.com/iveresk/CVE-2022-29885\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-01T09:07:26.000000Z"}, {"uuid": "fd59c854-8178-49ea-b9c3-f778c5cf9cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2609", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aApache Tomcat DoS (CVE-2022-29885) Exploit \nURL\uff1ahttps://github.com/4ra1n/CVE-2022-29885\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-02T04:12:23.000000Z"}, {"uuid": "8c3ad2ac-ac13-417b-8e30-b61373f19283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "seen", "source": "Telegram/tvagmoXGD-sjRG5teDO-DfPH2_iB-IEEjYRnLqN5-gAxoA", "content": "", "creation_timestamp": "2022-07-15T08:17:26.000000Z"}, {"uuid": "3a0e8356-a0c9-47d7-84b6-f9aebc6e159b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "Telegram/-h5elRfZctG-aUd3dw0eY53VHCzOGJCXi3zvJY_7v4zbQw", "content": "", "creation_timestamp": "2022-06-30T21:34:58.000000Z"}, {"uuid": "2adbf2b9-b69c-4e07-adc5-3cbffa696499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29888", "type": "seen", "source": "https://t.me/true_secator/3632", "content": "Cisco Talos \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 InRouter302 InHand Networks, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430 \u0438 \u0432\u043d\u0435\u0441\u0442\u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\nInRouter \u2014 \u044d\u0442\u043e \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0439 LTE-\u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0437\u0430\u0449\u0438\u0442\u044b, \u0432\u043a\u0435\u043b\u044e\u044f\u0430\u044f VPN-\u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u044d\u0442\u043e \u043b\u0438\u0448\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u043d\u0430\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u043e\u043c Talos \u0424\u0440\u0430\u043d\u0447\u0435\u0441\u043a\u043e \u0411\u0435\u043d\u0432\u0435\u043d\u0443\u0442\u043e \u0432 InRouter302.\n\n\u0420\u0430\u043d\u0435\u0435 Talos \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u043b\u0430, \u043a\u0430\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0438\u0442\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0441\u043b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c root-\u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443.\n\nTALOS-2022-1523\u00a0(CVE-2022-25932) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043d\u043e\u0432\u043e\u0433\u043e \u043f\u0430\u0442\u0447\u0430, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f\u00a0TALOS-2022-1472 \u0438\u00a0TALOS-2022-1474 \u043d\u0435 \u0438\u043c\u0435\u043b\u043e \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0430 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u044b\u0439 \u043a\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u043e\u0442\u043b\u0430\u0434\u043a\u0438.\n\nInRouter302 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442 \u0443\u0441\u043b\u0443\u0433\u0438 telnet \u0438 SSHD.\u00a0\u041f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043e\u0431\u0430 \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u0442 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430.\n\n\u0418\u0437 \u043a\u043e\u043d\u0441\u043e\u043b\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u043c\u0438 \u0432\u0430\u0436\u043d\u044b\u043c\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u043c\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432\u0432\u0435\u0441\u0442\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0444\u043b\u0430\u0433\u043e\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043f\u0438\u0441\u0438 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e.\n\n\u0412 \u0447\u0438\u0441\u043b\u0435 \u0434\u0440\u0443\u0433\u0438\u0445: \u0422\u0410\u041b\u041e\u0421-2022-1518 (CVE-2022-29481), TALOS-2022-1519 (CVE-2022-30543), \u0422\u0410\u041b\u041e\u0421-2022-1520 (CVE-2022-26023) \u0438 \u0422\u0410\u041b\u041e\u0421-2022-1521 (CVE-2022-28689.\n\nTALOS-2022-1522\u00a0(CVE-2022-29888) \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c, \u0435\u0441\u043b\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441.\n\n\u041f\u0440\u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043d\u0430\u0440\u0443\u0448\u0430\u044f \u0435\u0433\u043e \u0440\u0430\u0431\u043e\u0442\u0443 \u0438\u043b\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b.", "creation_timestamp": "2022-10-28T11:12:28.000000Z"}, {"uuid": "8b001f80-5105-4178-8b9e-cc1e616918d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "seen", "source": "https://t.me/crackcodes/838", "content": "Updates On Hackbyte Forum:-\n\n\ud83d\udcccRetbleed: Arbitrary Speculative Code Execution with Return Instructions\n\ud83d\udcccExecuting Arbitrary Code Over a Phone Line Thanks to the XBAND Video Game Modem\n\ud83d\udcccRolling PWN Attack Affecting Honda Vehicles\n\ud83d\udcccCVE-2022-32223 Discovery: DLL Hijacking via npm CLI\n\ud83d\udcccFrom Prototype Pollution to Remote Code Execution in Blitz.js\n\ud83d\udcccAttacking Active Directory: 0 to 0.9\n\ud83d\udcccCVE-2022-29885 \u2013 Apache Tomcat Cluster Service DoS\n\ud83d\udcccCVE-2022-29593\n\ud83d\udcccNorth South University / Bangladesh / email login\n\ud83d\udcccdeeppaste Leak\n\ud83d\udcccLivejournalfull Leak\n\ud83d\udcccGemotest Crm Leak\n\ud83d\udcccSplunk Attack\n\ud83d\udcccNzyme - WiFi Defense System\n\ud83d\udcccProject-Whis - Advanced HTTP Botnet\n\ud83d\udcccCode Signing Certificate Cloning Attack\n\ud83d\udcccRetbleed - Arbitrary Speculative Code Execution with Return Instruction.\n\ud83d\udcccConfluence Pre-Auth RCE.\n\ud83d\udcccmicrosoft-rpc-fuzzing-tools\n\ud83d\udcccCVE-2022-26135\n\ud83d\udcccXSS Payload List\n\ud83d\udcccheaders for hackers | PHP #ssrf | #cve-2020-7066 Video\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffb Updates:- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-07-16T09:11:59.000000Z"}, {"uuid": "75df853b-2761-4204-a332-13ce491102c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/reconshell/1314", "content": "CVE-2022-29885 Apache Tomcat DoS\n\n#Hacking #Bugbounty #Exploit #Malware #CyberSecurity\n#CVE-2022-29885 #Apache #Tomcat #DoS #Pentest #VAPT\n\nhttps://reconshell.com/cve-2022-29885-apache-tomcat-dos/", "creation_timestamp": "2022-07-03T08:20:13.000000Z"}, {"uuid": "d5931755-6b5d-4b73-8f63-645f68eca3cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29887", "type": "seen", "source": "https://t.me/cibsecurity/68300", "content": "\u203c CVE-2022-29887 \u203c\n\nCross-site Scripting (XSS) in some Intel(R) Manageability Commander software before version 2.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:29:42.000000Z"}, {"uuid": "d77f5064-0a20-4e10-8fa1-24ad785f5729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29889", "type": "seen", "source": "https://t.me/cibsecurity/52035", "content": "\u203c CVE-2022-29889 \u203c\n\nA hard-coded password vulnerability exists in the telnet functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z. Use of a hard-coded root password can lead to arbitrary command execution. An attacker can authenticate with hard-coded credentials to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-25T20:27:05.000000Z"}, {"uuid": "49bf1120-b48b-4b5f-aa6b-40ea08be45a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29888", "type": "seen", "source": "https://t.me/cibsecurity/52718", "content": "\u203c CVE-2022-29888 \u203c\n\nA leftover debug code vulnerability exists in the httpd port 4444 upload.cgi functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted HTTP request can lead to arbitrary file deletion. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-09T20:36:17.000000Z"}, {"uuid": "c4753293-0471-4dd4-b933-4cb67ef8b784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29884", "type": "seen", "source": "https://t.me/cibsecurity/45968", "content": "\u203c CVE-2022-29884 \u203c\n\nA vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70\u00c2\u00b0C (All versions &lt; CPC80 V16.30), CP-8000 MASTER MODULE WITH I/O -40/+70\u00c2\u00b0C (All versions &lt; CPC80 V16.30), CP-8021 MASTER MODULE (All versions &lt; CPC80 V16.30), CP-8022 MASTER MODULE WITH GPRS (All versions &lt; CPC80 V16.30). When using the HTTPS server under specific conditions, affected devices do not properly free resources. This could allow an unauthenticated remote attacker to put the device into a denial of service condition.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T14:20:08.000000Z"}, {"uuid": "ab8e2d05-a53f-4340-a3ee-617b1a03827f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29886", "type": "seen", "source": "https://t.me/cibsecurity/47668", "content": "\u203c CVE-2022-29886 \u203c\n\nAn integer overflow vulnerability exists in the way ESTsoft Alyac 2.5.8.544 parses OLE files. A specially-crafted OLE file can lead to a heap buffer overflow, which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-06T02:21:08.000000Z"}, {"uuid": "0675f684-48fd-44c9-be57-bccd6e603636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29880", "type": "seen", "source": "https://t.me/cibsecurity/43048", "content": "\u203c CVE-2022-29880 \u203c\n\nA vulnerability has been identified in SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00). Affected devices do not properly validate input in the configuration interface. This could allow an authenticated attacker to place persistent XSS attacks to perform arbitrary actions in the name of a logged user which accesses the affected views.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-20T16:36:39.000000Z"}, {"uuid": "9878928a-e11c-49e8-9bb0-d7762dc62835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29883", "type": "seen", "source": "https://t.me/cibsecurity/43053", "content": "\u203c CVE-2022-29883 \u203c\n\nA vulnerability has been identified in SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00). Affected devices do not restrict unauthenticated access to certain pages of the web interface. This could allow an attacker to delete log files without authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-20T16:36:45.000000Z"}, {"uuid": "dd70669c-6bda-49e2-a1ca-bb795a65b6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29881", "type": "seen", "source": "https://t.me/cibsecurity/43056", "content": "\u203c CVE-2022-29881 \u203c\n\nA vulnerability has been identified in SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-20T16:36:48.000000Z"}, {"uuid": "a20a7bc4-4f78-4bf4-b438-ca97faee0b5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29882", "type": "seen", "source": "https://t.me/cibsecurity/43051", "content": "\u203c CVE-2022-29882 \u203c\n\nA vulnerability has been identified in SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P850 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00), SICAM P855 (All versions &lt; V3.00). Affected devices do not handle uploaded files correctly. An unauthenticated attacker could take advantage of this situation to store an XSS attack, which could - when a legitimate user accesses the error logs - perform arbitrary actions in the name of the user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-20T16:36:43.000000Z"}, {"uuid": "bf95622a-c1e1-4d6d-97f0-a045a412e2f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6139", "content": "#exploit\n1. Tomcat CVE-2022-29885\nhttps://4ra1n.love/post/5zNrXSlvJ\n2. CVE-2021-25076:\nWordpress Plugin WP User Frontend &lt; 3.5.26 - SQL-Injection\nhttps://github.com/0xAbbarhSF/CVE-2021-25076\n3. CVE-2020-29607:\nPluck CMS 4.7.13 - File Upload RCE\nhttps://github.com/0xAbbarhSF/CVE-2020-29607", "creation_timestamp": "2022-06-05T13:17:01.000000Z"}]}