{"vulnerability": "CVE-2022-4100", "sightings": [{"uuid": "cca53e90-be35-425a-b74f-7852984e9083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4100", "type": "seen", "source": "https://t.me/cvedetector/4575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-4100 - WordPress WP Cerber Security IP Protection Header Injection\", \n  \"Content\": \"CVE ID : CVE-2022-4100 \nPublished : Aug. 31, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : The WP Cerber Security plugin for WordPress is vulnerable to IP Protection bypass in versions up to, and including 9.4 due to the plugin improperly checking for a visitor's IP address. This makes it possible for an attacker whose IP address has been blocked to bypass this control by setting the X-Forwarded-For: HTTP header to an IP Address that hasn't been blocked. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-31T11:42:57.000000Z"}, {"uuid": "e6844054-b808-4793-bd48-fba2e7857e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41009", "type": "seen", "source": "https://t.me/cibsecurity/56998", "content": "\u203c CVE-2022-41009 \u203c\n\nSeveral stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'port triger protocol (tcp|udp|tcp/udp) triger port &lt;1-65535&gt; forward port &lt;1-65535&gt; description WORD' command template.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:44:10.000000Z"}, {"uuid": "de05ac2f-409c-437d-af3f-e53aaed4064f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41000", "type": "seen", "source": "https://t.me/cibsecurity/56994", "content": "\u203c CVE-2022-41000 \u203c\n\nSeveral stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no gre index &lt;1-8&gt; tunnel A.B.C.D source (A.B.C.D|null) dest A.B.C.D keepalive (on|off) interval (&lt;0-255&gt;|null) retry (&lt;0-255&gt;|null) description (WORD|null)' command template.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:44:06.000000Z"}, {"uuid": "99b27955-1e21-47c7-8253-342c1e506c18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41006", "type": "seen", "source": "https://t.me/cibsecurity/56962", "content": "\u203c CVE-2022-41006 \u203c\n\nSeveral stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no ip static route destination A.B.C.D gateway A.B.C.D mask A.B.C.D metric &lt;0-10&gt; interface (lan|wan|vpn) description WORD' command template.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:38:58.000000Z"}, {"uuid": "1643b698-3d39-49b0-b539-3ad94c7e72f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41007", "type": "seen", "source": "https://t.me/cibsecurity/56972", "content": "\u203c CVE-2022-41007 \u203c\n\nSeveral stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'port redirect protocol (tcp|udp|tcp/udp) inport &lt;1-65535&gt; dstaddr A.B.C.D export &lt;1-65535&gt; description WORD' command template.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:39:12.000000Z"}, {"uuid": "9828d85a-5e52-47b5-a4af-5d0b6e9fe13a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41003", "type": "seen", "source": "https://t.me/cibsecurity/56969", "content": "\u203c CVE-2022-41003 \u203c\n\nSeveral stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'ip nat outside source (udp|tcp|all) (WORD|null) WORD to A.B.C.D (WORD|null) description (WORD|null)' command template.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:39:08.000000Z"}, {"uuid": "482d18a5-2d34-4aa2-b2cc-6dd173267f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41002", "type": "seen", "source": "https://t.me/cibsecurity/56950", "content": "\u203c CVE-2022-41002 \u203c\n\nSeveral stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no icmp check link WORD destination WORD interval &lt;1-255&gt; retries &lt;1-255&gt; description (WORD|null)' command template.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:34:03.000000Z"}]}