{"vulnerability": "CVE-2022-4027", "sightings": [{"uuid": "fd719c1d-5081-4841-8d3e-29de211f6a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4027", "type": "seen", "source": "https://t.me/cibsecurity/53674", "content": "\u203c CVE-2022-4027 \u203c\n\nThe Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during a forum response in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when responding to forum threads that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-30T00:29:30.000000Z"}, {"uuid": "2312eefb-f0e6-46ab-a1e2-25c7e24ff5fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40277", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17043", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40277\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.\n\ud83d\udccf Published: 2022-09-30T16:20:59.000Z\n\ud83d\udccf Modified: 2025-05-20T18:32:21.014Z\n\ud83d\udd17 References:\n1. https://fluidattacks.com/advisories/skrillex/\n2. https://github.com/laurent22/joplin", "creation_timestamp": "2025-05-20T18:42:24.000000Z"}, {"uuid": "cfa594ce-4631-40d8-89c1-d2e4ba773031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40274", "type": "seen", "source": "https://t.me/cibsecurity/50777", "content": "\u203c CVE-2022-40274 \u203c\n\nGridea version 0.9.3 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Gridea. This is possible because the application has the 'nodeIntegration' option enabled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-30T20:36:15.000000Z"}, {"uuid": "7bc4cda1-1903-4f0e-8da1-49dbc1949787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40276", "type": "seen", "source": "https://t.me/cibsecurity/52531", "content": "\u203c CVE-2022-40276 \u203c\n\nZettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T23:25:53.000000Z"}, {"uuid": "5042c147-30dd-4419-8d1d-42c402144a09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40277", "type": "seen", "source": "https://t.me/cibsecurity/50784", "content": "\u203c CVE-2022-40277 \u203c\n\nJoplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-30T20:36:23.000000Z"}, {"uuid": "4073b135-f9b9-4458-861a-c4dc3df727d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40278", "type": "seen", "source": "https://t.me/cibsecurity/50670", "content": "\u203c CVE-2022-40278 \u203c\n\nAn issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). createDB in security/provisioning/src/provisioningdatabasemanager.c has a missing sqlite3_free after sqlite3_exec, leading to a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-29T07:44:50.000000Z"}]}