{"vulnerability": "CVE-2022-3042", "sightings": [{"uuid": "1ceeebfe-c268-4215-ac23-54a1381e2617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30426", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17673", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-30426\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version &lt;= P13 (latest) and AP130 F2 firmware version &lt;= P04 (latest) and Aspire 1600X firmware version &lt;= P11.A3L (latest) and Aspire 1602M firmware version &lt;= P11.A3L (latest) and Aspire 7600U firmware version &lt;= P11.A4 (latest) and Aspire MC605 firmware version &lt;= P11.A4L (latest) and Aspire TC-105 firmware version &lt;= P12.B0L (latest) and Aspire TC-120 firmware version &lt;= P11-A4 (latest) and Aspire U5-620 firmware version &lt;= P11.A1 (latest) and Aspire X1935 firmware version &lt;= P11.A3L (latest) and Aspire X3475 firmware version &lt;= P11.A3L (latest) and Aspire X3995 firmware version &lt;= P11.A3L (latest) and Aspire XC100 firmware version &lt;= P11.B3 (latest) and Aspire XC600 firmware version &lt;= P11.A4 (latest) and Aspire Z3-615 firmware version &lt;= P11.A2L (latest) and Veriton E430G firmware version &lt;= P21.A1 (latest) and Veriton B630_49 firmware version &lt;= AAP02SR (latest) and Veriton E430 firmware version &lt;= P11.A4 (latest) and Veriton M2110G firmware version &lt;= P21.A3 (latest) and Veriton M2120G fir.\n\ud83d\udccf Published: 2022-09-22T23:06:15.000Z\n\ud83d\udccf Modified: 2025-05-27T16:05:10.117Z\n\ud83d\udd17 References:\n1. http://acer.com\n2. http://altos.com\n3. https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md", "creation_timestamp": "2025-05-27T16:53:04.000000Z"}, {"uuid": "8a669850-a1cb-41c6-81f7-511868745ae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30425", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mgvcd3cbxn2m", "content": "", "creation_timestamp": "2026-03-12T21:02:34.180394Z"}, {"uuid": "34ce7c31-c60f-44de-b9f7-39d1f7cef96f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30421", "type": "seen", "source": "https://t.me/cibsecurity/57205", "content": "\u203c CVE-2022-30421 \u203c\n\nImproper Authentication vulnerability in Toshiba Storage Security Software V1.2.0.7413 is that allows for sensitive information to be obtained via(local) password authentication module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T07:37:53.000000Z"}, {"uuid": "08e8eebd-bad5-43e1-b889-95beb65f5a55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30422", "type": "seen", "source": "https://t.me/cibsecurity/44745", "content": "\u203c CVE-2022-30422 \u203c\n\nProietti Tech srl Planet Time Enterprise 4.2.0.1,4.2.0.0,4.1.0.0,4.0.0.0,3.3.1.0,3.3.0.0 is vulnerable to Remote code execution via the Viewstate parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-17T20:22:54.000000Z"}, {"uuid": "c7bb34be-ee1c-4f0b-8a72-14c0e5cd1e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30429", "type": "seen", "source": "https://t.me/cibsecurity/43751", "content": "\u203c CVE-2022-30429 \u203c\n\nMultiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were found in versions 3.3.29 and 8.0.1 and could also be present in all intermediate versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-02T22:25:43.000000Z"}, {"uuid": "46fda0e5-8d69-445f-bc1f-2df9e677e6a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30426", "type": "seen", "source": "https://t.me/cibsecurity/50296", "content": "\u203c CVE-2022-30426 \u203c\n\nThere is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version &lt;= P13 (latest) and AP130 F2 firmware version &lt;= P04 (latest) and Aspire 1600X firmware version &lt;= P11.A3L (latest) and Aspire 1602M firmware version &lt;= P11.A3L (latest) and Aspire 7600U firmware version &lt;= P11.A4 (latest) and Aspire MC605 firmware version &lt;= P11.A4L (latest) and Aspire TC-105 firmware version &lt;= P12.B0L (latest) and Aspire TC-120 firmware version &lt;= P11-A4 (latest) and Aspire U5-620 firmware version &lt;= P11.A1 (latest) and Aspire X1935 firmware version &lt;= P11.A3L (latest) and Aspire X3475 firmware version &lt;= P11.A3L (latest) and Aspire X3995 firmware version &lt;= P11.A3L (latest) and Aspire XC100 firmware version &lt;= P11.B3 (latest) and Aspire XC600 firmware version &lt;= P11.A4 (latest) and Aspire Z3-615 firmware version &lt;= P11.A2L (latest) and Veriton E430G firmware version &lt;= P21.A1 (latest) and Veriton B630_49 firmware version &lt;= AAP02SR (latest) and Veriton E430 firmware version &lt;= P11.A4 (latest) and Veriton M2110G firmware version &lt;= P21.A3 (latest) and Veriton M2120G fir.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T07:12:54.000000Z"}]}