{"vulnerability": "CVE-2022-3068", "sightings": [{"uuid": "22696a10-33a4-44e3-9f0f-4571a6a124d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3068", "type": "seen", "source": "https://t.me/cibsecurity/50195", "content": "\u203c CVE-2022-3068 \u203c\n\nImproper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-21T16:40:50.000000Z"}, {"uuid": "dda35348-be4a-400f-a812-dfa88610cd47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30684", "type": "seen", "source": "https://t.me/cibsecurity/49970", "content": "\u203c CVE-2022-30684 \u203c\n\nAdobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T22:35:14.000000Z"}, {"uuid": "7876ac7d-86a5-4227-8bfd-a4d7104afa3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30681", "type": "seen", "source": "https://t.me/cibsecurity/49980", "content": "\u203c CVE-2022-30681 \u203c\n\nAdobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T22:35:28.000000Z"}, {"uuid": "86409d95-977f-4829-91e9-eae9567c5885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30682", "type": "seen", "source": "https://t.me/cibsecurity/49953", "content": "\u203c CVE-2022-30682 \u203c\n\nAdobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T22:29:13.000000Z"}, {"uuid": "9fd64f11-9f56-44cc-baae-5befbaf4321c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30687", "type": "seen", "source": "https://t.me/cibsecurity/43469", "content": "\u203c CVE-2022-30687 \u203c\n\nTrend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that could allow a low privileged local user to manipulate the product\u00e2\u20ac\u2122s secure erase feature to delete arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-27T07:14:39.000000Z"}, {"uuid": "c2119594-5162-4f49-9a8f-e85da00c2e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30689", "type": "seen", "source": "https://t.me/cibsecurity/42860", "content": "\u203c CVE-2022-30689 \u203c\n\nHashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate Enterprise MFA feature set. Fixed in 1.10.3.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T22:27:59.000000Z"}, {"uuid": "78d62dc7-c360-41f4-bfc6-f38c3ea2a15e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30688", "type": "seen", "source": "https://t.me/cibsecurity/42852", "content": "\u203c CVE-2022-30688 \u203c\n\nneedrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T22:27:47.000000Z"}]}