{"vulnerability": "CVE-2022-37393", "sightings": [{"uuid": "6d5fc72e-62f5-4cde-8b7d-f37f9cfabcea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37393", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:48.000000Z"}, {"uuid": "b000b161-8efd-41aa-ac42-5d9e008deb8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37393", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "aa6108eb-f0e6-4125-a06a-6c38b4dd64ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37393", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/zimbra_slapper_priv_esc.rb", "content": "", "creation_timestamp": "2022-08-09T16:39:19.000000Z"}, {"uuid": "60dc686c-8302-4cd9-844d-1c3fa76a354f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37393", "type": "published-proof-of-concept", "source": "Telegram/RSu8n7LvnC9xeCRU6JhJsfiUmeq682EnNiL5z7-ptljYhA", "content": "", "creation_timestamp": "2022-08-17T14:35:04.000000Z"}, {"uuid": "54a0ea26-fba9-438c-b7a5-ff136f0753c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37393", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/427", "content": "CVE-2022-37393 : Privilege escalation in Zimbra Collaboration Suite\nRepo : https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis\nNuclei : https://github.com/projectdiscovery/nuclei-templates/pull/5134/files\nMeta : https://github.com/rapid7/metasploit-framework/pull/16807", "creation_timestamp": "2022-08-20T10:30:14.000000Z"}, {"uuid": "36cac417-51e0-4e3d-ac0d-97ddc5f6b760", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37393", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6631", "content": "#exploit\n1. CVE-2022-36271:\nhttps://github.com/SaumyajeetDas/POC-of-CVE-2022-36271\n\n2. Sysax &lt;= 5.53 SSH Username BoF Pre Auth RCE\nhttps://github.com/M4fiaB0y/Sysax-multi-server-ssh-username-exploit\n\n3. CVE-2022-37393:\nPrivilege escalation in Zimbra Collaboration Suite\nhttps://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis", "creation_timestamp": "2022-08-19T11:18:01.000000Z"}]}