{"vulnerability": "CVE-2022-3217", "sightings": [{"uuid": "327008ba-a11f-419e-8e3e-a656b3053f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32174", "type": "seen", "source": "https://t.me/cibsecurity/51117", "content": "\u203c CVE-2022-32174 \u203c\n\nIn Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T18:25:50.000000Z"}, {"uuid": "a21c3d17-6aa0-4e05-9740-20cb5754c00b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32175", "type": "seen", "source": "https://t.me/cibsecurity/51120", "content": "\u203c CVE-2022-32175 \u203c\n\nIn AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T18:25:55.000000Z"}, {"uuid": "1ca3cc8c-22dc-44d9-bbe3-a2ddf83ba58f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32176", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15881", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-32176\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In \"Gin-Vue-Admin\", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the \"Compress Upload\" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.\n\ud83d\udccf Published: 2022-10-17T18:25:09.233Z\n\ud83d\udccf Modified: 2025-05-10T02:53:12.843Z\n\ud83d\udd17 References:\n1. https://www.mend.io/vulnerability-database/CVE-2022-32176\n2. https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/image.vue#L43-L49", "creation_timestamp": "2025-05-10T03:26:14.000000Z"}, {"uuid": "b7e752d8-5fe2-42a4-9d13-eb0bed35e5a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32171", "type": "seen", "source": "https://t.me/cibsecurity/50900", "content": "\u203c CVE-2022-32171 \u203c\n\nIn Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user\u00e2\u20ac\u2122s credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-06T22:16:50.000000Z"}, {"uuid": "d4098007-5f4f-4772-8bea-0de744cf262f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32176", "type": "seen", "source": "https://t.me/cibsecurity/51624", "content": "\u203c CVE-2022-32176 \u203c\n\nIn \"Gin-Vue-Admin\", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the \"Compress Upload\" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-17T22:13:21.000000Z"}, {"uuid": "a052043b-8480-4fcb-91fa-b2b244bbd336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32173", "type": "seen", "source": "https://t.me/cibsecurity/50825", "content": "\u203c CVE-2022-32173 \u203c\n\nIn OrchardCore rc1-11259 to v1.2.2 vulnerable to HTML injection, allow an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-03T16:39:08.000000Z"}]}