{"vulnerability": "CVE-2022-32275", "sightings": [{"uuid": "bcbacfce-7209-41b6-986f-bf0df2422582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32275", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:07.000000Z"}, {"uuid": "e4298aae-d170-4244-b34f-53c9c55382f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32275", "type": "seen", "source": "Telegram/R-HGiQTul2lcQLKBnhR-2gbWBVvSbjLi1y7N_WorJ6roN7X3", "content": "", "creation_timestamp": "2024-12-29T00:29:36.000000Z"}, {"uuid": "e9060bbc-744d-410e-9633-be9b00dc8d7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32275", "type": "published-proof-of-concept", "source": "https://t.me/bhhub/793", "content": "#BugBountyTips of the Day\nYay, I was awarded 200$ bounty on @Bugcrowd  This one is my first bounty ever. It will motivate me a lot for my future journey.And specially thanks to @EmptyMahbob for always your support and @GodfatherOrwa for always sharing some unique tips.  #bugbounty #TogetherWeHitHarder  https://t.co/BNIXCsVpIt\n---\nPro tip for #bugbounty:  Go over all URLs to test at least three times, preferably on separate days.  On the first pass, I find the most stuff.  On the 2nd pass, I find most issues I missed.  On the 3rd pass, I barely find anything at all but still have usually missed a few. \ud83d\ude1c\ud83e\udd73\n---\nCVE-2022-32275 \ud83d\ude36  #BugBounty  https://t.co/h9MO9vKLro\n---\nFor Beginners  https://t.co/kUzws8Mxz1  #bugbountytips #infosec #cybersecurity\n---\nToday somehow popped a shell on the main application a major cryptocurrency exchange. The impact is as devastating as the Web3 bugs you could have seen recently on other programs. The report was sent to their security team. Web2 bugs are alive. #bugbounty  https://t.co/DrN23ItZxT", "creation_timestamp": "2022-06-08T13:37:04.000000Z"}, {"uuid": "205a6e64-f7bf-405f-943d-40d1d88ec071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32275", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6326", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (June 1-30)\n\nCVE-2022-30190 - Follina exploit\nCVE-2022-26134 - OGNL injection in Atlassian Confluence Server/Data Center\nCVE-2022-26809 - Weakness in a core Windows 7/10/Srv19/22 component (RPC)\nCVE-2022-30075 - TP-Link AX50 Auth RCE\nCVE-2022-23222 - Linux Kernel eBPF LPE\nCVE-2022-32275 - Grafana 8.4.3 allows reading files\nCVE-2022-26937 - Windows NFS NLM Portmap Stack Buffer Overflow\nCVE-2022-23088 - Heap Overflow in FreeBSD Wi-Fi Stack\nCVE-2022-31626 - RCE in PHP &lt;=7.4.29\nCVE-2022-30333 - Dir Traversal in rar", "creation_timestamp": "2024-10-12T06:49:41.000000Z"}, {"uuid": "2179e570-16de-41e9-b46e-4d19947022fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32275", "type": "seen", "source": "https://t.me/cibsecurity/43869", "content": "\u203c CVE-2022-32275 \u203c\n\nGrafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-06T22:30:08.000000Z"}]}