{"vulnerability": "CVE-2022-3793", "sightings": [{"uuid": "9f86797c-3f17-4c1c-9ad3-c1ffbd150ab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37932", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lztuw2yfdd23", "content": "", "creation_timestamp": "2025-09-27T21:02:26.426838Z"}, {"uuid": "7886f6a0-f95a-4518-88f3-e9a5e171531b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37939", "type": "seen", "source": "https://t.me/cibsecurity/59835", "content": "\u203c CVE-2022-37939 \u203c\n\nA potential security vulnerability has been identified in HPE Superdome Flex and Superdome Flex 280 servers. The vulnerability could be locally exploited to allow disclosure of information. HPE has made the following software to resolve the vulnerability in HPE Superdome Flex Servers v3.65.8 and Superdome Flex 280 Servers v1.45.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-11T00:21:29.000000Z"}, {"uuid": "c63000ba-df75-4210-ba74-df9191cffed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37933", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11248", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37933\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L)\n\ud83d\udd39 Description: A potential security vulnerability has been identified in HPE Superdome Flex and Superdome Flex 280 servers. The vulnerability could be exploited to allow local unauthorized data injection. HPE has made the following software updates to resolve the vulnerability in HPE Superdome Flex firmware 3.60.50 and below and Superdome Flex 280 servers firmware 1.40.60 and below.\n\n\n\ud83d\udccf Published: 2023-01-03T18:31:35.870Z\n\ud83d\udccf Modified: 2025-04-10T15:45:08.304Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&amp;docId=emr_na-hpesbhf04400en_us", "creation_timestamp": "2025-04-10T15:48:50.000000Z"}, {"uuid": "b80e97ca-f922-498d-a533-21cac041c38e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37932", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13316", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37932\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A potential security vulnerability has been identified in Hewlett Packard Enterprise OfficeConnect 1820, 1850, and 1920S Network switches. The vulnerability could be remotely exploited to allow authentication bypass. HPE has made the following software updates to resolve the vulnerability in Hewlett Packard Enterprise OfficeConnect 1820, 1850 and 1920S Network switches versions: Prior to PT.02.14; Prior to PC.01.22; Prior to PO.01.21; Prior to PD.02.22;\n\n\n\ud83d\udccf Published: 2022-11-30T15:23:14.750Z\n\ud83d\udccf Modified: 2025-04-24T18:42:08.233Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&amp;docId=emr_na-hpesbnw04383en_us", "creation_timestamp": "2025-04-24T19:06:43.000000Z"}, {"uuid": "bb871a08-2575-48ef-be35-6008b945bf52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37932", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lz7r6t6d3j2n", "content": "", "creation_timestamp": "2025-09-19T21:02:34.432659Z"}, {"uuid": "e6a7783e-404f-49d1-891f-b7c46b7f342d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37934", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37934\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: A potential security vulnerability has been identified in HPE OfficeConnect 1820, and 1850 switch series. The vulnerability could be remotely exploited to allow remote directory traversal in HPE OfficeConnect 1820 switch series version PT.02.17 and below, HPE OfficeConnect 1850 switch series version PC.01.23 and below, and HPE OfficeConnect 1850 (10G aggregator) switch version PO.01.22 and below.\n\n\n\ud83d\udccf Published: 2023-01-03T18:33:15.954Z\n\ud83d\udccf Modified: 2025-04-10T15:42:45.470Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&amp;docId=emr_na-hpesbnw04401en_us", "creation_timestamp": "2025-04-10T15:48:52.000000Z"}, {"uuid": "d07b65a6-b818-4b84-a0a6-d115ea07e4b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37930", "type": "seen", "source": "https://t.me/cibsecurity/54309", "content": "\u203c CVE-2022-37930 \u203c\n\nA security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays and HPE Nimble Storage Secondary Flash Arrays which could potentially allow local disclosure of sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T16:25:50.000000Z"}, {"uuid": "a3cb0db7-5101-4bec-bd06-2a6d636120a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37937", "type": "seen", "source": "https://t.me/cibsecurity/59204", "content": "\u203c CVE-2022-37937 \u203c\n\nPre-auth memory corruption in HPE Serviceguard\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-01T12:39:29.000000Z"}, {"uuid": "0426022e-d349-4554-842a-2739f6147a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37932", "type": "seen", "source": "https://t.me/cibsecurity/54312", "content": "\u203c CVE-2022-37932 \u203c\n\nA potential security vulnerability has been identified in Hewlett Packard Enterprise OfficeConnect 1820, 1850, and 1920S Network switches. The vulnerability could be remotely exploited to allow authentication bypass. HPE has made the following software updates to resolve the vulnerability in Hewlett Packard Enterprise OfficeConnect 1820, 1850 and 1920S Network switches versions: Prior to PT.02.14; Prior to PC.01.22; Prior to PO.01.21; Prior to PD.02.22;\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T16:25:53.000000Z"}, {"uuid": "e6766605-85b0-43f8-b770-d661dc21d74a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37931", "type": "seen", "source": "https://t.me/cibsecurity/53313", "content": "\u203c CVE-2022-37931 \u203c\n\nA vulnerability in NetBatch-Plus software allows unauthorized access to the application. HPE has provided a workaround and fix. Please refer to HPE Security Bulletin HPESBNS04388 for details.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T10:40:36.000000Z"}, {"uuid": "d90187e4-0b73-4b69-aa53-05cece3bbc75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37933", "type": "seen", "source": "https://t.me/cibsecurity/55936", "content": "\u203c CVE-2022-37933 \u203c\n\nA potential security vulnerability has been identified in HPE Superdome Flex and Superdome Flex 280 servers. The vulnerability could be exploited to allow local unauthorized data injection. HPE has made the following software updates to resolve the vulnerability in HPE Superdome Flex firmware 3.60.50 and below and Superdome Flex 280 servers firmware 1.40.60 and below.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-05T12:23:44.000000Z"}, {"uuid": "a2a549ce-3e68-49c9-9ba7-a3abcc756395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3793", "type": "seen", "source": "https://t.me/cibsecurity/52809", "content": "\u203c CVE-2022-3793 \u203c\n\nAn improper authorization issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to read variables set directly in a GitLab CI/CD configuration file they don't have access to.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T02:53:01.000000Z"}]}