{"vulnerability": "CVE-2022-35202", "sightings": [{"uuid": "1cb2c0fd-a360-4cfd-b2fd-6378c49a7390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwendeo7m2d", "content": "", "creation_timestamp": "2025-02-11T19:15:41.747857Z"}, {"uuid": "cf75f080-94dc-4fec-9f2d-8d08b37576b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lhwkyydwnl23", "content": "", "creation_timestamp": "2025-02-11T21:09:35.358250Z"}, {"uuid": "d0556363-1eb3-4f9b-88be-58c41cf2f1d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwovydvy42u", "content": "", "creation_timestamp": "2025-02-11T22:19:31.772422Z"}, {"uuid": "6ccac578-aca9-4780-96bf-d6953833da4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "6bbaa402-e8ab-4faf-bbb5-298ad255baa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhxbxzfiks2m", "content": "", "creation_timestamp": "2025-02-12T04:00:45.385420Z"}, {"uuid": "ed32aef2-69a2-4950-bc13-560fd1ddceba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://threatintel.cc/2025/02/11/how-autogenerated-passwords-in-sitevision.html", "content": "", "creation_timestamp": "2025-02-12T02:26:21.000000Z"}, {"uuid": "0f110925-129c-40a4-8f58-d5d289afd9b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lhyhlw3dwx2y", "content": "", "creation_timestamp": "2025-02-12T15:13:55.506392Z"}, {"uuid": "065c5a8e-a9a5-4ba7-aa32-55aad94aa334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35202", "type": "seen", "source": "https://t.me/cvedetector/17736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-35202 - Sitevision Java Keystore Exfiltration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-35202 \nPublished : Feb. 11, 2025, 7:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : A security issue in Sitevision version 10.3.1 and older allows a remote attacker, in certain (non-default) scenarios, to gain access to the private keys used for signing SAML Authn requests. The underlying issue is a Java keystore that may become accessible and downloadable via WebDAV. This keystore is protected with a low-complexity, auto-generated password. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:24.000000Z"}]}