{"vulnerability": "CVE-2022-3785", "sightings": [{"uuid": "852d400a-9e01-46b5-80a5-9e9dc345df1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37857", "type": "seen", "source": "https://t.me/cibsecurity/49472", "content": "\u203c CVE-2022-37857 \u203c\n\nbilde2910 Hauk v1.6.1 requires a hardcoded password which by default is blank. This hardcoded password is hashed but stored within the config.php file server-side as well as in clear-text on the android client device by default.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-08T20:15:28.000000Z"}, {"uuid": "c5c02e5a-11f0-48da-9af5-ea9fe57ab302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3785", "type": "seen", "source": "https://t.me/cibsecurity/52327", "content": "\u203c CVE-2022-3785 \u203c\n\nA vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212564.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T23:13:37.000000Z"}]}