{"vulnerability": "CVE-2022-3181", "sightings": [{"uuid": "dd2565d7-ff60-4959-bf09-7202290b2fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "7f84d2f3-37d0-447c-9b64-2246cf9f857b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:16.000000Z"}, {"uuid": "8acc937f-a71e-4184-a32b-82949af217d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-133-01", "content": "", "creation_timestamp": "2025-05-13T10:00:00.000000Z"}, {"uuid": "5980a4fc-2c56-497b-8258-28d43964a678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:46.000000Z"}, {"uuid": "d50f44a7-c0c3-46be-a65a-300e18c63be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31812", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-02", "content": "", "creation_timestamp": "2025-05-29T10:00:00.000000Z"}, {"uuid": "a49a619b-c525-48c1-84c6-cb3ba48cc931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31812", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu5h6z6e22q", "content": "", "creation_timestamp": "2025-05-23T17:23:13.144207Z"}, {"uuid": "7dba6eec-b0e8-4310-8da2-aacf8eb06ccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-22)", "content": "", "creation_timestamp": "2026-02-22T00:00:00.000000Z"}, {"uuid": "7699dda2-d1a2-4347-87a3-536233926204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/pfsense_pfblockerng_webshell.rb", "content": "", "creation_timestamp": "2022-10-13T02:51:32.000000Z"}, {"uuid": "51d54c27-2f6b-4595-889f-1e82f4c4690d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-02)", "content": "", "creation_timestamp": "2025-12-02T00:00:00.000000Z"}, {"uuid": "b1d7b7d0-c3fc-437b-8c12-001ee10d6f62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-03)", "content": "", "creation_timestamp": "2025-12-03T00:00:00.000000Z"}, {"uuid": "ffcc54f9-a517-4249-8dd0-1f6dc5ecbc8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-21)", "content": "", "creation_timestamp": "2026-02-21T00:00:00.000000Z"}, {"uuid": "c6ba809f-6e83-4c95-b71e-4a38aff46096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-23)", "content": "", "creation_timestamp": "2026-02-23T00:00:00.000000Z"}, {"uuid": "9ca45437-edd2-4a09-9154-b391449218c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-17)", "content": "", "creation_timestamp": "2026-02-17T00:00:00.000000Z"}, {"uuid": "5972ac60-becc-49f7-95ba-1aca17dd98ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-11)", "content": "", "creation_timestamp": "2026-02-11T00:00:00.000000Z"}, {"uuid": "8b1a4a06-1563-448c-bbfa-c8917f20e015", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-18)", "content": "", "creation_timestamp": "2026-02-18T00:00:00.000000Z"}, {"uuid": "b311b61b-971b-4cda-8cf2-15fcf9cc96a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-28)", "content": "", "creation_timestamp": "2026-01-28T00:00:00.000000Z"}, {"uuid": "a1b954ff-deb6-4f9a-b488-a79295a0167a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-12)", "content": "", "creation_timestamp": "2026-03-12T00:00:00.000000Z"}, {"uuid": "4c091ace-1082-4d3c-86b8-75d68ecaf374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/75", "content": "Top Security News for 27/07/2022\n\nVRChat Security Update Throws the Metaverse Into Chaos\nhttps://www.vice.com/en_us/article/y3pv8v/vrchat-security-update-throws-the-metaverse-into-chaos \n\nZyxel authentication bypass patch analysis (CVE-2022-0342)\nhttps://www.reddit.com/r/netsec/comments/w8few6/zyxel_authentication_bypass_patch_analysis/ \n\nWhat\u2019s New in the 2022 Cost of a Data Breach Report\nhttps://securityintelligence.com/posts/whats-new-2022-cost-of-a-data-breach-report/ \n\nExperts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware\nhttps://thehackernews.com/2022/07/experts-find-similarities-between.html \n\nHackers Increasingly Using WebAssembly Coded Cryptominers to Evade Detection\nhttps://thehackernews.com/2022/07/hackers-increasingly-using-webassembly.html \n\nHunting For Mass Assignment Vulnerabilities Using GitHub CodeSearch and grep.app\nhttps://www.reddit.com/r/netsec/comments/w8qn2n/hunting_for_mass_assignment_vulnerabilities_using/ \n\nBypass AMSI in local process hooking NtCreateSection\nhttps://www.reddit.com/r/netsec/comments/w8ehda/bypass_amsi_in_local_process_hooking/ \n\nLockBit Ransomware Claims Pwn Of Italy's Tax Agency\nhttps://packetstormsecurity.com/news/view/33667/LockBit-Ransomware-Claims-Pwn-Of-Italys-Tax-Agency.html \n\nISC StormCast for Wednesday, July 27th, 2022\nhttps://isc.sans.edu/podcastdetail.html?id=8104 \n\nCVE-2022-31813: Forwarding addresses is hard\nhttps://www.reddit.com/r/netsec/comments/w8llor/cve202231813_forwarding_addresses_is_hard/ \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2022-07-27T08:31:04.000000Z"}, {"uuid": "523e40ae-6098-479f-9116-c761a0d02e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-24)", "content": "", "creation_timestamp": "2026-01-24T00:00:00.000000Z"}, {"uuid": "079a9204-be11-4688-8dd7-0bcbda9d5248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31812", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17447", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31812\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SiPass integrated (All versions &lt; V2.95.3.18). Affected server applications contain an out of bounds read past the end of an allocated buffer while checking the integrity of incoming packets. This could allow an unauthenticated remote attacker to create a denial of service condition.\n\ud83d\udccf Published: 2025-05-23T15:03:39.864Z\n\ud83d\udccf Modified: 2025-05-23T17:01:19.066Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-041082.html", "creation_timestamp": "2025-05-23T17:47:48.000000Z"}, {"uuid": "692721b7-9205-4dce-b7c5-955513888ae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/127", "content": "Top Security News for 06/09/2022\n\nRansomware Attackers Abuse Genshin Impact Anti-Cheat System to Disable Antivirus\nhttps://thehackernews.com/2022/09/ransomware-attackers-abuse-genshin.html \n\nSAT/SMT Solvers by Example\nhttps://www.reddit.com/r/netsec/comments/x6y3hk/satsmt_solvers_by_example/ \n\nISC StormCast for Tuesday, September 6th, 2022\nhttps://isc.sans.edu/podcastdetail.html?id=8160 \n\nCVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files\nhttps://www.reddit.com/r/netsec/comments/x6aqwc/cve202230190_aka_follina_uses_macroless_word_docs/ \n\nPackMyPayload - Emerging Threat of Containerized Malware. It can serve purpose for a Proof-of-Concept presenting emerging risk of container file formats with embedded malware.\nhttps://www.reddit.com/r/Malware/comments/x6xpb4/packmypayload_emerging_threat_of_containerized/ \n\nHacking my Helium Crypto Miner\nhttps://www.reddit.com/r/netsec/comments/x6d97k/hacking_my_helium_crypto_miner/ \n\nJPCERT/CC Releases URL Dataset of Confirmed Phishing Sites\nhttps://malware.news/t/jpcert-cc-releases-url-dataset-of-confirmed-phishing-sites/63125/1 \n\nISC Stormcast For Tuesday, September 6th, 2022 https://isc.sans.edu/podcastdetail.html?id=8160, (Tue, Sep 6th)\nhttps://malware.news/t/isc-stormcast-for-tuesday-september-6th-2022-https-isc-sans-edu-podcastdetail-html-id-8160-tue-sep-6th/63123/1 \n\nWalkthrough of an unauthenticated RCE affecting pfBlockerNG &lt;= 2.1.4_26 (CVE-2022-31814)\nhttps://www.reddit.com/r/netsec/comments/x6b5is/walkthrough_of_an_unauthenticated_rce_affecting/ \n\nMicrosoft will disable Basic authentication for Exchange Online in less than a month\nhttps://www.malwarebytes.com/blog/news/2022/09/microsoft-to-disable-basic-auth-for-exchange-online-in-less-than-a-month \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2022-09-06T14:51:49.000000Z"}, {"uuid": "50cb7624-5b3e-4091-a091-9b97d117b81a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "seen", "source": "Telegram/eXJ6uhsB4kT2KyMwIIgJLCK6BJUbaFQ2cqtfVl9phdXYTZg", "content": "", "creation_timestamp": "2023-03-06T19:04:24.000000Z"}, {"uuid": "4ce5fa3e-00ab-4342-9230-7cd008761216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "published-proof-of-concept", "source": "Telegram/kM42HgldlfA8QwVmwCT4PRPpwGPvjQvwwRQ7JxFcRXWr7Q", "content": "", "creation_timestamp": "2022-08-04T11:40:49.000000Z"}, {"uuid": "4acbc447-8703-4b98-9053-40531efe5620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "seen", "source": "https://t.me/CyberBulletin/309", "content": "\u26a1\ufe0fExploiting pfsense Remote Code Execution \u2013 CVE-2022-31814.\n\n#CyberBulletin", "creation_timestamp": "2024-08-09T15:50:50.000000Z"}, {"uuid": "ed90ba52-4039-46e1-adcb-f5ecc251d861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "seen", "source": "Telegram/Hf_SunJuoYNf_bsQCJ20cuXyI7bzH8EMEXzusn30k3vpXeQ", "content": "", "creation_timestamp": "2024-10-15T10:14:15.000000Z"}, {"uuid": "4e47572c-26b1-45e4-aee9-447e9835a2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "published-proof-of-concept", "source": "Telegram/qbRDczufhEAwfoxE7jsw2afVmX33EpB44LRknpUqHzmwaHs", "content": "", "creation_timestamp": "2025-01-16T22:00:05.000000Z"}, {"uuid": "d19b1662-b44a-4508-b5c8-d1ba9495c1b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/356", "content": "CVE-2022-31813 : Apache HTTP Server 2.4.53 Forwarding Addresses is Hard\nhttps://www.synacktiv.com/publications/cve-2022-31813-forwarding-addresses-is-hard.html", "creation_timestamp": "2022-07-29T09:00:00.000000Z"}, {"uuid": "4799429c-5905-4460-8963-46a5af751d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/923", "content": "Updates On Hackbyte Forum:-\n\n\n1. [BG] HappyDreams.bg / Sleepshop.bg \u2013 Server Data\n2. msn.com Leak\n3. (ImHex) A Hex Editor for Reverse Engineers\n4. Rapid7 Nexpose 6.6.153 Crack\n5. CompTIA A+ Certification Study Guide\n6. Lockbit3.0-MpClient-Defender-PoC: Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC\n7. CVE-2022-31813: Forwarding addresses is hard\n8. Corrupting memory without memory corruption\n9. How the WordPress Gets Hacked in 2022 \u2013 Initial Reconnaissance\n10. Spear Phishing on Modern Platforms\n11. Scraping Login Credentials With XSS\n12. Building a Self-Destructing USB Drive.\n13. SSTImap \u2013 Automatic SSTI detection tool with interactive interface\n14. sante.gov.dz Leak\n15. ekz Group Leaked\n16. Overload Layer 7 DDOS\n17. Black-Dragon - An Advanced Automation Tool For Web-Recon Developed For Linux Systems.\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-05T04:50:53.000000Z"}, {"uuid": "e032de7f-e3b6-4b4f-b005-2c182db3c56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6748", "content": "#exploit\n1. CVE-2022-31814:\npfBlockerNG Unauth RCE Vulnerability\nhttps://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability\n]-&gt; https://github.com/Laburity/CVE-2022-31814\n\n2. Reviving Exploits Against Cred Structs - Six Byte Cross Cache Overflow to Leakless Data-Oriented Kernel Pwnage\nhttps://www.willsroot.io/2022/08/reviving-exploits-against-cred-struct.html\n\n3. CVE-2022-2639:\nLinux kernel openvswitch LPE\nhttps://github.com/veritas501/CVE-2022-2639-PipeVersion", "creation_timestamp": "2025-01-17T05:52:10.000000Z"}, {"uuid": "58a018f6-d980-4f60-a34b-0ff23e46f3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31810", "type": "seen", "source": "https://t.me/cibsecurity/66356", "content": "\u203c CVE-2022-31810 \u203c\n\nA vulnerability has been identified in SiPass integrated (All versions &lt; V2.90.3.8). Affected server applications improperly check the size of data packets received for the configuration client login, causing a stack-based buffer overflow.This could allow an unauthenticated remote attacker to crash the server application, creating a denial of service condition.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T14:29:46.000000Z"}, {"uuid": "7a894752-9596-46bd-a63f-9d54a6b01d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "seen", "source": "https://t.me/cibsecurity/44129", "content": "\u203c CVE-2022-31813 \u203c\n\nApache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-09T20:33:43.000000Z"}, {"uuid": "04a52d4f-e91d-4ad9-9566-dc1e9ff66e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31814", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9010", "content": "Exploiting pfsense Remote Code Execution \u2013 CVE-2022-31814 - Laburity\n\nhttps://laburity.com/exploiting-pfsense-remote-code-execution-cve-2022-31814/", "creation_timestamp": "2024-08-09T09:14:40.000000Z"}, {"uuid": "25d73aea-7050-46e1-9a09-8a5eb6fff638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6480", "content": "#exploit\n1. CVE-2022-31813:\nForwarding Addresses is Hard\nhttps://www.synacktiv.com/publications/cve-2022-31813-forwarding-addresses-is-hard.html\n\n2. CVE-2022-34907, CVE-2022-34906:\nCritical vulnerabilities in FileWave\u2019s mobile device management (MDM) system\nhttps://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm", "creation_timestamp": "2022-07-28T12:16:44.000000Z"}, {"uuid": "4d4b5fa8-4c68-43bf-8832-9d97b2047137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31813", "type": "seen", "source": "https://t.me/LearnExploit/3598", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0648\u0628 \u0633\u0631\u0648\u0631 APACHE \n\n\u062f\u0631 \u0646\u0633\u062e\u0647\u200c 2.4.53 \u0648\u0628 \u0633\u0631\u0648\u0631 Apache \u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0645\u0627 \u0642\u0628\u0644 \u0622\u0646\u060c \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc (9.8 \u0627\u0632 10) \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2022-31813 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f. \u0645\u0637\u0627\u0628\u0642 \u0628\u0627 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u060c \u0627\u06af\u0631 \u0647\u0650\u062f\u0631 Connection \u0633\u0645\u062a \u06a9\u0644\u0627\u06cc\u0646\u062a \u0627\u0632 \u0646\u0648\u0639 hop-by-hop \u0628\u0627\u0634\u062f\u060c \u0648\u0628 \u0633\u0631\u0648\u0631 Apache \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u06a9\u0647 \u0647\u062f\u0631\u0647\u0627\u06cc X-Forwarded-* \u0631\u0627 \u0628\u0647 \u0633\u0631\u0648\u0631 \u0627\u0635\u0644\u06cc \u0627\u0631\u0633\u0627\u0644 \u0646\u0646\u0645\u0627\u06cc\u062f. \u0627\u06cc\u0646 \u0627\u0645\u0631 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0631\u0627\u06cc \u062f\u0648\u0631 \u0632\u062f\u0646 \"\u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631IP\" \u062f\u0631 \u0633\u0631\u0648\u0631 \u0627\u0635\u0644\u06cc \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f.\n\n\u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u060c \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0631\u0627 \u0628\u0647 \u0646\u0633\u062e\u0647 2.4.54-1 \u06cc\u0627 \u0628\u0627\u0644\u0627\u062a\u0631 \u0627\u0631\u062a\u0642\u0627 \u062f\u0647\u06cc\u062f.\n\u2014\u2014\u2014\u2014\u2014\u2014\u2067\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-07-01T15:28:50.000000Z"}]}