{"vulnerability": "CVE-2022-3661", "sightings": [{"uuid": "5b00bbbb-7a0d-429f-b57e-acd499e7bfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36617", "type": "seen", "source": "https://t.me/cibsecurity/49545", "content": "\u203c CVE-2022-36617 \u203c\n\nArq Backup 7.19.5.0 and below stores backup encryption passwords using reversible encryption. This issue allows attackers with administrative privileges to recover cleartext passwords.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T20:27:20.000000Z"}, {"uuid": "f52ad8e8-c650-434c-800f-4680aec216da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3661", "type": "seen", "source": "https://t.me/cibsecurity/52442", "content": "\u203c CVE-2022-3661 \u203c\n\nInsufficient data validation in Extensions in Google Chrome prior to 107.0.5304.62 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted Chrome Extension. (Chrome security severity: Low)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T01:19:14.000000Z"}, {"uuid": "4db7900e-a74d-4d24-b783-3a4023dc25bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36616", "type": "seen", "source": "https://t.me/cibsecurity/48957", "content": "\u203c CVE-2022-36616 \u203c\n\nTOTOLINK A810R V4.1.2cu.5182_B20201026 and V5.9c.4050_B20190424 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:43.000000Z"}, {"uuid": "6e3a7a9e-05a3-48a9-a502-9413981912c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36619", "type": "seen", "source": "https://t.me/cibsecurity/49154", "content": "\u203c CVE-2022-36619 \u203c\n\nIn D-link DIR-816 A2_v1.10CNB04.img,the network can be reset without authentication via /goform/setMAC.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T02:37:16.000000Z"}, {"uuid": "c29e61e2-4b29-474f-9cb4-35a9bf35aeae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36610", "type": "seen", "source": "https://t.me/cibsecurity/48952", "content": "\u203c CVE-2022-36610 \u203c\n\nTOTOLINK A720R V4.1.5cu.532_B20210610 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:36.000000Z"}, {"uuid": "3585d8c1-ddeb-475b-bede-8a2e24a2704d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36613", "type": "seen", "source": "https://t.me/cibsecurity/48951", "content": "\u203c CVE-2022-36613 \u203c\n\nTOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:35.000000Z"}, {"uuid": "89155d13-77d5-44a8-b020-d316ff10610a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36615", "type": "seen", "source": "https://t.me/cibsecurity/48950", "content": "\u203c CVE-2022-36615 \u203c\n\nTOTOLINK A3000RU V4.1.2cu.5185_B20201128 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:34.000000Z"}, {"uuid": "8f8d3f63-3db8-43ec-9a54-9bdbbc782005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36611", "type": "seen", "source": "https://t.me/cibsecurity/48955", "content": "\u203c CVE-2022-36611 \u203c\n\nTOTOLINK A800R V4.1.2cu.5137_B20200730 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:41.000000Z"}, {"uuid": "2446bf82-8d70-4858-acd3-0b9f871536b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36614", "type": "seen", "source": "https://t.me/cibsecurity/48954", "content": "\u203c CVE-2022-36614 \u203c\n\nTOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:40.000000Z"}, {"uuid": "85a31d8c-7c89-4fd9-b6c0-c30f35a75015", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36612", "type": "seen", "source": "https://t.me/cibsecurity/48958", "content": "\u203c CVE-2022-36612 \u203c\n\nTOTOLINK A950RG V4.1.2cu.5204_B20210112 was discovered to contain a hardcoded password for root at /etc/shadow.sample.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T07:33:47.000000Z"}]}