{"vulnerability": "CVE-2022-4029", "sightings": [{"uuid": "2aa7f094-b283-46ef-8140-fc6ced537c38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40290", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15186", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40290\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: \nThe application was vulnerable to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in the barcode generation functionality, allowing attackers to generate an unsafe link that could compromise users.\n\n\n\ud83d\udccf Published: 2022-10-31T20:09:06.555Z\n\ud83d\udccf Modified: 2025-05-06T19:11:44.820Z\n\ud83d\udd17 References:\n1. https://www.themissinglink.com.au/security-advisories/cve-2022-40290", "creation_timestamp": "2025-05-06T19:20:59.000000Z"}, {"uuid": "e39e1190-40e7-4408-bb91-d46f827741b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40291", "type": "seen", "source": "https://t.me/cibsecurity/52328", "content": "\u203c CVE-2022-40291 \u203c\n\nThe application was vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing an attacker to coerce users into sending malicious requests to the site to delete their account, or in rare circumstances, hijack their account and create other admin accounts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T23:13:38.000000Z"}, {"uuid": "991f0144-ed3c-4850-8889-aeffe8a59e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4029", "type": "seen", "source": "https://t.me/cibsecurity/53691", "content": "\u203c CVE-2022-4029 \u203c\n\nThe Simple:Press plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sforum_[md5 hash of the WordPress URL]' cookie value in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This would be highly complex to exploit as it would require the attacker to set the cookie a cookie for the targeted user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-01T11:35:47.000000Z"}, {"uuid": "3dc305ec-05f7-4a6c-ba26-8c539dd0d767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40297", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2752", "content": "#Tools -\u00a0 \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\nMicrowaveo\n\nConvert dll exe, etc. to an encrypted shellcode.\n\nhttps://github.com/Ciyfly/microwaveo\n\nCVE-2022-40297\n\nPrivilage escalation in Ubuntu Touch 16.04 - by PIN Bruteforce.\n\nhttps://github.com/filipkarc/PoC-ubuntutouch-pin-privesc\n\n#cve\n\nexploits-predict\n\nPredicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)\n\nhttps://github.com/wisoffe/exploits-predict\n\n#cve #exploit\n\nvMass Bot\n\nvMass Bot automates the exploitation of remote hosts by trying to find environment files (.env) in target hosts and extract tools and info insde, then the bot detects the target host CMS and tries to auto exploit and upload shell payload using the vMass vulnerability set ( 108 exploits in the current version 1.2).\n\nNo target list ? No worries, vMass Bot can generate hosts lists from IP ranges, URL list, dotenv low profile dorks and scrapes from (bing, duckduckgo, ..) or you can use IP ranges from various hosting providers for best hit rate while scanning, then generated lists can be checked using the bot to eleminate dead hosts.\n\nhttps://github.com/c99tn/vMass\n\nCVE-2022-36804-RCE\n\nZimbra Unauthenticated Remote Code Execution Exploit.\n\nhttps://github.com/mohamedbenchikh/CVE-2022-27925\n\n#cve #exploit\n\nEfiCMake\n\nCMake template for a basic EFI application/bootkit.\n\nhttps://github.com/mrexodia/EfiCMake\n\nDuckySploit\n\nV3 Roblox Level 7 Executor Free.\n\nFeatures:\n\u25ab\ufe0f Dark Hub\n\u25ab\ufe0f Dex Explorer\n\u25ab\ufe0f Fusionic Hub\n\u25ab\ufe0f Kraken Hub\n\u25ab\ufe0f Ori Hub\n\u25ab\ufe0f Owl Hub\n\u25ab\ufe0f Solaris\n\u25ab\ufe0f Zyrex Hub\n\nhttps://github.com/Omnis9/DuckySploit-V3\n\nChameleon\n\nChameleon provides better content discovery by using wappalyzer's set of technology fingerprints alongside custom wordlists tailored to each detected technologies.\n\nThe tool is highly customizable and allows users to add in their own custom wordlits, extensions or fingerprints.\n\nhttps://github.com/iustin24/chameleon\n\nThe full documentation is available on: \nhttps://youst.in/posts/context-aware-conent-discovery-with-chameleon/\n\nLIKE-DBG\n\nFully dockerized Linux kernel debugging environment.\n\n(LInux-KErnel-DeBuGger) aims at automating the boring steps when trying to set up a Linux kernel debugging environment.\n\nhttps://github.com/0xricksanchez/like-dbg\n\npypykatz\n\nMimikatz implementation in pure Python. \n\nhttps://github.com/skelsec/pypykatz\n\nAndroid RAT\n\n#RAT built in Android APP for Android User\n\nhttps://github.com/Th30neAnd0nly/Ohm\n\nSudo-Stealer\n\nSudo-Stealer is an *nix program for stealing sudo passwords by disguising as the original sudo software. Its capabilities are almost similar to that of the original sudo program as such as displaying the same input messages, error messages like incorrect attempts and also handling of some system signals such as SIGQUIT, SIGINT &amp; SIGTSTP. It verify the password, stores it in json support as well as username, the command that was executed and the execution time in a file for later usage.\n\nFeatures:\n\u25ab\ufe0f Maximum of 3 wrong password attempts\n\u25ab\ufe0f Timeouts the superuser session's after 15 minutes\n\u25ab\ufe0f Stores correct passwords with their respective commands and the time it was executed\n\nhttps://github.com/Genaro-Chris/Sudo-Stealer\n\nEvil-Storm\n\nThis tool can create a Fake Access point.\n\nFeatures:\n\u25ab\ufe0f Create a Fake AP with a specific name and password\n\u25ab\ufe0f DNS spoofing (not completed)\n\u25ab\ufe0f ARP spoofing\n\u25ab\ufe0f Reverse shell\n\u25ab\ufe0f give the Victim Access to the Internet after connecting to your Fake AP\n\u25ab\ufe0f see all websites victim open it you are the Router\n\nhttps://github.com/Root3inspector/Evil-Storm\n\nLimeLighter\n\nA tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products and avoid MSS and sock scruitney. LimeLighter can also use valid code signing certificates to sign files. Limelighter can use a fully qualified domain name such as acme.com.\n\nhttps://github.com/Tylous/Limelighter\n\nJoin:\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory\n\nWebsite:\nwww.ghostclan.org\n\n#InsoSec #cybersec \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06", "creation_timestamp": "2023-03-29T02:59:56.000000Z"}, {"uuid": "512ea03e-7984-4e16-ae44-dc089c5ebc41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40290", "type": "seen", "source": "https://t.me/cibsecurity/52322", "content": "\u203c CVE-2022-40290 \u203c\n\nThe application was vulnerable to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in the barcode generation functionality, allowing attackers to generate an unsafe link that could compromise users.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T23:13:29.000000Z"}, {"uuid": "2c8f4193-3f40-48eb-b2a5-d274ce41e8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40294", "type": "seen", "source": "https://t.me/cibsecurity/52319", "content": "\u203c CVE-2022-40294 \u203c\n\nThe application was identified to have an CSV injection in data export functionality, allowing for malicious code to be embedded within export data and then triggered in exported data viewers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T23:13:23.000000Z"}, {"uuid": "da289760-cc55-454b-b3fc-887238547a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40297", "type": "seen", "source": "https://t.me/cibsecurity/49487", "content": "\u203c CVE-2022-40297 \u203c\n\nUBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T07:15:49.000000Z"}, {"uuid": "751babf2-a694-4bed-938f-168f5a59baa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40298", "type": "seen", "source": "https://t.me/cibsecurity/50295", "content": "\u203c CVE-2022-40298 \u203c\n\nCrestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T07:12:53.000000Z"}, {"uuid": "c5c434c7-b4c3-4f0b-94d8-34cf098461cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40293", "type": "seen", "source": "https://t.me/cibsecurity/52311", "content": "\u203c CVE-2022-40293 \u203c\n\nThe application was vulnerable to a session fixation that could be used hijack accounts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T23:13:13.000000Z"}, {"uuid": "8a9674d7-7a8e-4376-986d-c73028d6722f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40297", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6771", "content": "#exploit\n1. CVE-2022-32792:\nWebKit B3ReduceStrength Out-of-Bounds Write\nhttps://starlabs.sg/blog/2022/09-step-by-step-walkthrough-of-cve-2022-32792\n\n2. CVE-2022-31188:\nOpenCV CVAT SSRF\nhttps://github.com/emirpolatt/CVE-2022-31188\n\n3. CVE-2022-40297:\nPrivilage escalation in Ubuntu Touch 16.04 - by PIN Bruteforce\nhttps://github.com/filipkarc/PoC-ubuntutouch-pin-privesc", "creation_timestamp": "2022-09-10T13:17:01.000000Z"}, {"uuid": "c39e4e63-5273-4c8f-be64-748682b4010e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40299", "type": "seen", "source": "https://t.me/cibsecurity/49486", "content": "\u203c CVE-2022-40299 \u203c\n\nIn Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T07:15:48.000000Z"}]}