{"vulnerability": "CVE-2022-4184", "sightings": [{"uuid": "a4d2d792-5e58-4391-9588-42660135363b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-18)", "content": "", "creation_timestamp": "2025-05-18T00:00:00.000000Z"}, {"uuid": "c4d9a0cf-d56f-464d-af20-3dd1e5b3a59e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "be31e726-fd86-4cb0-ad5f-6d8ae567f8f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-06)", "content": "", "creation_timestamp": "2025-06-06T00:00:00.000000Z"}, {"uuid": "dce12693-5795-4d00-9697-46b66ca32508", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-17)", "content": "", "creation_timestamp": "2026-03-17T00:00:00.000000Z"}, {"uuid": "d250e20a-27d5-486a-a84e-da54c225c43c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-04)", "content": "", "creation_timestamp": "2025-06-04T00:00:00.000000Z"}, {"uuid": "5173da9b-8164-419a-a11b-4013d1f48e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-07)", "content": "", "creation_timestamp": "2026-01-07T00:00:00.000000Z"}, {"uuid": "25cf3285-23c3-4524-ab71-040221d829d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41842", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17044", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41842\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Xpdf 4.04. There is a crash in gfseek(_IO_FILE*, long, int) in goo/gfile.cc.\n\ud83d\udccf Published: 2022-09-30T04:21:47.000Z\n\ud83d\udccf Modified: 2025-05-20T19:37:39.861Z\n\ud83d\udd17 References:\n1. http://www.xpdfreader.com/download.html\n2. https://forum.xpdfreader.com/viewtopic.php?f=1&amp;t=42340&amp;p=43928&amp;hilit=gfseek#p43928", "creation_timestamp": "2025-05-20T19:40:35.000000Z"}, {"uuid": "be0f230d-8da8-4dca-bc3a-52094ff1fefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-41848", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "e93db748-6720-44d3-a427-5f1d085cb75b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41847", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17054", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41847\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&amp;) in System/StdC/Ap4StdCFileByteStream.cpp.\n\ud83d\udccf Published: 2022-09-30T04:41:54.000Z\n\ud83d\udccf Modified: 2025-05-20T19:35:10.048Z\n\ud83d\udd17 References:\n1. https://github.com/axiomatic-systems/Bento4/issues/750\n2. https://github.com/axiomatic-systems/Bento4/issues/759\n3. https://github.com/axiomatic-systems/Bento4/issues/775", "creation_timestamp": "2025-05-20T19:42:46.000000Z"}, {"uuid": "b3681d6a-b692-4e2f-a357-73d663ac7eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41841", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17052", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41841\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_File::ParseStream in Core/Ap4File.cpp, which is called from AP4_File::AP4_File.\n\ud83d\udccf Published: 2022-09-30T04:21:56.000Z\n\ud83d\udccf Modified: 2025-05-20T19:36:16.169Z\n\ud83d\udd17 References:\n1. https://github.com/axiomatic-systems/Bento4/issues/779", "creation_timestamp": "2025-05-20T19:42:44.000000Z"}, {"uuid": "a1bb9feb-e7a7-47da-80ae-4d028143293f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41846", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17061", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41846\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp.\n\ud83d\udccf Published: 2022-09-30T04:42:04.000Z\n\ud83d\udccf Modified: 2025-05-20T19:33:29.148Z\n\ud83d\udd17 References:\n1. https://github.com/axiomatic-systems/Bento4/issues/342\n2. https://github.com/axiomatic-systems/Bento4/issues/770", "creation_timestamp": "2025-05-20T19:43:00.000000Z"}, {"uuid": "89f81ea8-ec6a-4f34-9b12-b6fce45b933d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41840", "type": "seen", "source": "https://t.me/cibsecurity/53162", "content": "\u203c CVE-2022-41840 \u203c\n\nUnauth. Directory Traversal vulnerability in Welcart eCommerce plugin &lt;= 2.7.7 on WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-18T22:29:34.000000Z"}]}