{"vulnerability": "CVE-2022-4312", "sightings": [{"uuid": "78060ebc-8877-4b42-b081-cb5b7ea565f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43124", "type": "seen", "source": "https://t.me/cibsecurity/52382", "content": "\u203c CVE-2022-43124 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:14:03.000000Z"}, {"uuid": "26284354-5a63-4ab9-9a08-5b086679c79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43128", "type": "seen", "source": "https://t.me/cibsecurity/62245", "content": "\u203c CVE-2022-43128 \u203c\n\nDreamer CMS 4.0.1 allows SQL injection via ArchivesMapper.xml.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-16T07:27:14.000000Z"}, {"uuid": "99afb73f-9fb1-483b-9289-dd8f1c6d216d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4312", "type": "seen", "source": "https://t.me/cibsecurity/54352", "content": "\u203c CVE-2022-4312 \u203c\n\nA cleartext storage of sensitive information vulnerability exists in PcVue versions 8.10 through 15.2.3. This could allow an unauthorized user with access the email and short messaging service (SMS) accounts configuration files to discover the associated simple mail transfer protocol (SMTP) account credentials and the SIM card PIN code. Successful exploitation of this vulnerability could allow an unauthorized user access to the underlying email account and SIM card.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T20:21:18.000000Z"}, {"uuid": "9c950205-1af7-4f58-918c-26cb57ccb606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43126", "type": "seen", "source": "https://t.me/cibsecurity/52380", "content": "\u203c CVE-2022-43126 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/tests/manage_test.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:14:01.000000Z"}, {"uuid": "30431874-b72b-45fe-9ec0-0cc3b058a1a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43127", "type": "seen", "source": "https://t.me/cibsecurity/52371", "content": "\u203c CVE-2022-43127 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /appointments/update_status.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:13:45.000000Z"}, {"uuid": "d6f815ad-9642-43ac-a76a-0bdda1d722d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43125", "type": "seen", "source": "https://t.me/cibsecurity/52387", "content": "\u203c CVE-2022-43125 \u203c\n\nOnline Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /appointments/manage_appointment.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T17:14:10.000000Z"}]}