{"vulnerability": "CVE-2022-41572", "sightings": [{"uuid": "ba7911f0-4768-4603-a3e2-e3ab85279446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41572", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113793519730273207", "content": "", "creation_timestamp": "2025-01-08T15:48:35.570923Z"}, {"uuid": "b6e1b07b-cb42-4b17-9cfd-66a516183708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41572", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113788714578219448", "content": "", "creation_timestamp": "2025-01-07T19:26:34.004318Z"}, {"uuid": "80ffde09-da8a-4107-82da-da2f9e8a9bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41572", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf6hodwrjx2e", "content": "", "creation_timestamp": "2025-01-07T20:15:40.033588Z"}, {"uuid": "d3b74d6e-ca7c-4f23-b064-1ee03dab0e11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41572", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf6jqzw2n72u", "content": "", "creation_timestamp": "2025-01-07T20:52:59.453421Z"}, {"uuid": "35d336db-c8f4-4e73-91c9-5fb28036a576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41572", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/534", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41572\n\ud83d\udd39 Description: An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Privilege escalation can be accomplished on the server because nmap can be run as root. The attacker achieves total control over the server.\n\ud83d\udccf Published: 2025-01-07T00:00:00\n\ud83d\udccf Modified: 2025-01-07T19:24:35.658765\n\ud83d\udd17 References:\n1. https://github.com/EyesOfNetworkCommunity/eonweb/issues/120\n2. https://github.com/Orange-Cyberdefense/CVE-repository/", "creation_timestamp": "2025-01-07T19:38:20.000000Z"}, {"uuid": "260897f7-51c1-42f4-a8a9-b838e2369931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41572", "type": "seen", "source": "https://t.me/cvedetector/14608", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-41572 - EyesOfNetwork EON Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-41572 \nPublished : Jan. 7, 2025, 8:15 p.m. | 42\u00a0minutes ago \nDescription : An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Privilege escalation can be accomplished on the server because nmap can be run as root. The attacker achieves total control over the server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T22:15:08.000000Z"}]}