{"vulnerability": "CVE-2022-3805", "sightings": [{"uuid": "589791f3-76e4-4096-9887-6c88564747b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3805", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/passive/cves/2022/CVE-2022-3805.yaml", "content": "", "creation_timestamp": "2025-09-24T08:20:29.000000Z"}, {"uuid": "eccb9b4d-a16f-4798-8867-fea281306c1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38053", "type": "seen", "source": "Telegram/wXJFleV8vEaWRjyjght-R7V6rgaHTWmrrJG5mADAecKVQmw", "content": "", "creation_timestamp": "2023-04-09T15:26:50.000000Z"}, {"uuid": "0c7cc090-f570-47c4-8a64-d6fba4090519", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38053", "type": "seen", "source": "https://t.me/RespaldoHackingTeam/657", "content": "#exploit\n1. CVE-2022-46697:\nOut-of-bounds access in IOMobileFrameBuffer\nhttps://github.com/antoniozekic/Proof-of-concepts/tree/main/CVE-2022-46697\n\n2. CVE-2022-38053, CVE-2023-21742, CVE-2023-21717:\nSharePoint Webpart Property Traversal\nhttps://testbnull.medium.com/ph%C3%A2n-t%C3%ADch-l%E1%BB%97-h%E1%BB%95ng-sharepoint-webpart-property-traversal-cve-2022-38053-cve-2023-21742-bc6931698a5f\n\n3. CVE-2023-23398:\nMicrosoft Excel Spoofing\nhttps://packetstormsecurity.com/files/171752/Microsoft-Excel-Spoofing.html", "creation_timestamp": "2023-04-13T07:13:01.000000Z"}, {"uuid": "f95b554e-77c5-4d00-9c34-0ab8f9ce5887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38053", "type": "seen", "source": "Telegram/YrcJwFF7LRTjg7mgQwAEoX7-6-7JVVBbOdwyqXnUuY7Sxg", "content": "", "creation_timestamp": "2023-04-17T11:58:07.000000Z"}, {"uuid": "eb615302-8778-4634-8a4a-56d1978e013f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38056", "type": "seen", "source": "https://t.me/cibsecurity/58399", "content": "\u203c CVE-2022-38056 \u203c\n\nImproper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T00:12:49.000000Z"}, {"uuid": "e6c7654b-14b6-482d-8bf9-7c82cb09a470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3805", "type": "seen", "source": "https://t.me/cibsecurity/55199", "content": "\u203c CVE-2022-3805 \u203c\n\nThe Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-23T00:14:02.000000Z"}, {"uuid": "10d9debc-f4f2-47a8-b02b-91a2b2e445bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38051", "type": "seen", "source": "https://t.me/cibsecurity/51143", "content": "\u203c CVE-2022-38051 \u203c\n\nWindows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37997.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T22:26:05.000000Z"}, {"uuid": "69a95291-3e86-431f-b978-72a9015848e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38050", "type": "seen", "source": "https://t.me/cibsecurity/51150", "content": "\u203c CVE-2022-38050 \u203c\n\nWin32k Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T22:31:02.000000Z"}, {"uuid": "63e0e550-c7d4-4ad4-94f6-93ac77b5f44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38058", "type": "seen", "source": "https://t.me/cibsecurity/49505", "content": "\u203c CVE-2022-38058 \u203c\n\nAuthenticated (subscriber+) Plugin Setting change vulnerability in WP Shamsi plugin &lt;= 4.1.1 at WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T18:29:24.000000Z"}, {"uuid": "dcf971b2-e842-4420-a0e9-f92cac8d1bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38059", "type": "seen", "source": "https://t.me/cibsecurity/49528", "content": "\u203c CVE-2022-38059 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Alexey Trofimov's Access Code Feeder plugin &lt;= 1.0.3 at WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T18:32:29.000000Z"}, {"uuid": "37438ed0-4f2a-4cef-8b5d-391d922a58f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-38053", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/8083", "content": "#exploit\n1. CVE-2022-46697:\nOut-of-bounds access in IOMobileFrameBuffer\nhttps://github.com/antoniozekic/Proof-of-concepts/tree/main/CVE-2022-46697\n\n2. CVE-2022-38053, CVE-2023-21742, CVE-2023-21717:\nSharePoint Webpart Property Traversal\nhttps://testbnull.medium.com/ph%C3%A2n-t%C3%ADch-l%E1%BB%97-h%E1%BB%95ng-sharepoint-webpart-property-traversal-cve-2022-38053-cve-2023-21742-bc6931698a5f\n\n3. CVE-2023-23398:\nMicrosoft Excel Spoofing\nhttps://packetstormsecurity.com/files/171752/Microsoft-Excel-Spoofing.html", "creation_timestamp": "2023-04-09T13:17:01.000000Z"}]}