{"vulnerability": "CVE-2022-3741", "sightings": [{"uuid": "55d8e9e1-9381-405f-bd48-a3c11ad27ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37418", "type": "published-proof-of-concept", "source": "Telegram/O_lq0FhY4DAGM0IoqeGbjJtXzvAunOMRob1gJEPg1rMPHws", "content": "", "creation_timestamp": "2025-08-15T15:00:06.000000Z"}, {"uuid": "48e6ecf5-61fe-4a46-a728-0dc799d32150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37414", "type": "seen", "source": "https://t.me/ctinow/65117", "content": "Technical Advisory \u2013 Multiple Vulnerabilities in Juplink RX4-1800 WiFi Router (CVE-2022-37413, CVE-2022-37414)\n\nhttps://ift.tt/okV8nKp", "creation_timestamp": "2022-09-22T19:31:31.000000Z"}, {"uuid": "4aaf15cc-b6a9-4d49-9e4e-70cc01a1ad0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37413", "type": "seen", "source": "https://t.me/ctinow/65117", "content": "Technical Advisory \u2013 Multiple Vulnerabilities in Juplink RX4-1800 WiFi Router (CVE-2022-37413, CVE-2022-37414)\n\nhttps://ift.tt/okV8nKp", "creation_timestamp": "2022-09-22T19:31:31.000000Z"}, {"uuid": "5bfc43ef-5523-4e5e-81ac-9b8c0b5b2dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3741", "type": "seen", "source": "https://t.me/cibsecurity/52207", "content": "\u203c CVE-2022-3741 \u203c\n\nImpact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \\n\\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T16:29:12.000000Z"}, {"uuid": "92997b5e-194c-4c36-8de5-f7a743d011aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37412", "type": "seen", "source": "https://t.me/cibsecurity/49515", "content": "\u203c CVE-2022-37412 \u203c\n\nAuthenticated (admin+) Reflected Cross-Site Scripting (XSS) vulnerability in Galerio &amp; Urda's Better Delete Revision plugin &lt;= 1.6.1 at WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T18:29:34.000000Z"}, {"uuid": "01338e16-f31e-46fb-adab-1cb51b38526c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37416", "type": "seen", "source": "https://t.me/cibsecurity/47599", "content": "\u203c CVE-2022-37416 \u203c\n\nIttiam libmpeg2 before 2022-07-27 uses memcpy with overlapping memory blocks in impeg2_mc_fullx_fully_8x8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-05T12:20:26.000000Z"}, {"uuid": "e6a50fa5-3f5e-4cf8-970a-d6aa4044876f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37418", "type": "seen", "source": "https://t.me/cibsecurity/48634", "content": "\u203c CVE-2022-37418 \u203c\n\nThe Remote Keyless Entry (RKE) receiving unit on certain Nissan, Kia, and Hyundai vehicles through 2017 allows remote attackers to perform unlock operations and force a resynchronization after capturing two consecutive valid key fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-24T12:22:28.000000Z"}, {"uuid": "28d7a01e-cc79-42a5-8c49-920cf3ae4d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37415", "type": "seen", "source": "https://t.me/cibsecurity/47596", "content": "\u203c CVE-2022-37415 \u203c\n\nThe Uniwill SparkIO.sys driver 1.0 is vulnerable to a stack-based buffer overflow via IOCTL 0x40002008.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-05T07:20:12.000000Z"}]}