{"vulnerability": "CVE-2022-4018", "sightings": [{"uuid": "2a401eda-b99a-4358-af86-36aacf6453c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40189", "type": "seen", "source": "https://t.me/cibsecurity/53316", "content": "\u203c CVE-2022-40189 \u203c\n\nImproper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pig Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Pig Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Pig Provider is installed (Pig Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Pig Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-22T12:12:45.000000Z"}, {"uuid": "4901fe36-6783-49ca-9ef6-2ec1b275b282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40183", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14975", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40183\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: An error in the URL handler of the VIDEOJET multi 4000 may lead to a reflected cross site scripting (XSS) in the web-based interface. An attacker with knowledge of the encoder address can send a crafted link to a user, which will execute JavaScript code in the context of the user.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T19:04:45.654Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/bosch-sa-454166-bt.html", "creation_timestamp": "2025-05-05T19:20:38.000000Z"}, {"uuid": "d430f460-9c7e-4980-b536-b02f9e6d2163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15816", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40184\n\ud83d\udd25 CVSS Score: 5.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Incomplete filtering of JavaScript code in different configuration fields of the web based interface of the VIDEOJET multi 4000 allows an attacker with administrative credentials to store JavaScript code which will be executed for all administrators accessing the same configuration option.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T19:15:40.818Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/bosch-sa-454166-bt.html", "creation_timestamp": "2025-05-09T19:26:10.000000Z"}, {"uuid": "d4282f0e-0f41-443b-97a4-f1af2b729c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40183", "type": "seen", "source": "https://t.me/cibsecurity/52167", "content": "\u203c CVE-2022-40183 \u203c\n\nAn error in the URL handler of the VIDEOJET multi 4000 may lead to a reflected cross site scripting (XSS) in the web-based interface. An attacker with knowledge of the encoder address can send a crafted link to a user, which will execute JavaScript code in the context of the user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-27T20:33:37.000000Z"}, {"uuid": "8166cbf1-d77f-4f5f-a24e-12f41491e660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40184", "type": "seen", "source": "https://t.me/cibsecurity/52162", "content": "\u203c CVE-2022-40184 \u203c\n\nIncomplete filtering of JavaScript code in different configuration fields of the web based interface of the VIDEOJET multi 4000 allows an attacker with administrative credentials to store JavaScript code which will be executed for all administrators accessing the same configuration option.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-27T20:33:30.000000Z"}, {"uuid": "b62a7244-f4cf-4668-a5ce-2743b55a3ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40187", "type": "seen", "source": "https://t.me/cibsecurity/51301", "content": "\u203c CVE-2022-40187 \u203c\n\nForesight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-13T07:27:20.000000Z"}, {"uuid": "24f60430-5fc5-4cf9-9009-358847c5c90e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40180", "type": "seen", "source": "https://t.me/cibsecurity/51110", "content": "\u203c CVE-2022-40180 \u203c\n\nA vulnerability has been identified in Desigo PXM30-1 (All versions &lt; V02.20.126.11-41), Desigo PXM30.E (All versions &lt; V02.20.126.11-41), Desigo PXM40-1 (All versions &lt; V02.20.126.11-41), Desigo PXM40.E (All versions &lt; V02.20.126.11-41), Desigo PXM50-1 (All versions &lt; V02.20.126.11-41), Desigo PXM50.E (All versions &lt; V02.20.126.11-41), PXG3.W100-1 (All versions &lt; V02.20.126.11-37), PXG3.W100-2 (All versions &lt; V02.20.126.11-41), PXG3.W200-1 (All versions &lt; V02.20.126.11-37), PXG3.W200-2 (All versions &lt; V02.20.126.11-41). A Cross-Site Request Forgery exists in the \u00e2\u20ac\u0153Import Files\u00e2\u20ac\u0153 functionality of the \u00e2\u20ac\u0153Operation\u00e2\u20ac\ufffd web application due to the missing validation of anti-CSRF tokens or other origin checks. A remote unauthenticated attacker can upload and enable permanent arbitrary JavaScript code into the device just by convincing a victim to visit a specifically crafted webpage while logged-in to the device web application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T14:26:03.000000Z"}, {"uuid": "29f915cd-1c12-42c8-b99b-b9f6b19df2f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40188", "type": "seen", "source": "https://t.me/cibsecurity/50356", "content": "\u203c CVE-2022-40188 \u203c\n\nKnot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T20:43:43.000000Z"}, {"uuid": "17ac6a13-a038-406e-8db2-8f93bda5fd28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40181", "type": "seen", "source": "https://t.me/cibsecurity/51114", "content": "\u203c CVE-2022-40181 \u203c\n\nA vulnerability has been identified in Desigo PXM30-1 (All versions &lt; V02.20.126.11-41), Desigo PXM30.E (All versions &lt; V02.20.126.11-41), Desigo PXM40-1 (All versions &lt; V02.20.126.11-41), Desigo PXM40.E (All versions &lt; V02.20.126.11-41), Desigo PXM50-1 (All versions &lt; V02.20.126.11-41), Desigo PXM50.E (All versions &lt; V02.20.126.11-41), PXG3.W100-1 (All versions &lt; V02.20.126.11-37), PXG3.W100-2 (All versions &lt; V02.20.126.11-41), PXG3.W200-1 (All versions &lt; V02.20.126.11-37), PXG3.W200-2 (All versions &lt; V02.20.126.11-41). The device embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker can perform a range of attacks against the device, such as read arbitrary files on the filesystem, execute arbitrary JavaScript code in order to steal or manipulate the information on the screen, or trigger denial of service conditions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T14:26:07.000000Z"}, {"uuid": "c7500f77-22ce-4feb-ab2a-7c193de17505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40182", "type": "seen", "source": "https://t.me/cibsecurity/51101", "content": "\u203c CVE-2022-40182 \u203c\n\nA vulnerability has been identified in Desigo PXM30-1 (All versions &lt; V02.20.126.11-41), Desigo PXM30.E (All versions &lt; V02.20.126.11-41), Desigo PXM40-1 (All versions &lt; V02.20.126.11-41), Desigo PXM40.E (All versions &lt; V02.20.126.11-41), Desigo PXM50-1 (All versions &lt; V02.20.126.11-41), Desigo PXM50.E (All versions &lt; V02.20.126.11-41), PXG3.W100-1 (All versions &lt; V02.20.126.11-37), PXG3.W100-2 (All versions &lt; V02.20.126.11-41), PXG3.W200-1 (All versions &lt; V02.20.126.11-37), PXG3.W200-2 (All versions &lt; V02.20.126.11-41). The device embedded Chromium-based browser is launched as root with the \u00e2\u20ac\u0153--no-sandbox\u00e2\u20ac\ufffd option. Attackers can add arbitrary JavaScript code inside \u00e2\u20ac\u0153Operation\u00e2\u20ac\ufffd graphics and successfully exploit any number of publicly known vulnerabilities against the version of the embedded Chromium-based browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T14:25:50.000000Z"}, {"uuid": "5bcb7c51-4d99-49c8-8210-b02b0affd0a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40186", "type": "seen", "source": "https://t.me/cibsecurity/50252", "content": "\u203c CVE-2022-40186 \u203c\n\nAn issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-22T07:11:45.000000Z"}]}