{"vulnerability": "CVE-2022-4354", "sightings": [{"uuid": "9cf7dc21-5675-42fa-b9c1-0ecff4fcf6c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13220", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43549\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper authentication in Veeam Backup for Google Cloud v1.0 and v3.0 allows attackers to bypass authentication mechanisms.\n\ud83d\udccf Published: 2022-12-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T14:01:35.345Z\n\ud83d\udd17 References:\n1. https://www.veeam.com/kb4374", "creation_timestamp": "2025-04-24T14:05:33.000000Z"}, {"uuid": "197ece53-d585-4955-8133-fb270fe4f9f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43541", "type": "seen", "source": "https://t.me/cibsecurity/54318", "content": "\u203c CVE-2022-43541 \u203c\n\nVulnerabilities in the Aruba EdgeConnect Enterprise command line interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T16:26:00.000000Z"}, {"uuid": "6e03d5bf-7913-436b-9502-ad2af0f901db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43542", "type": "seen", "source": "https://t.me/cibsecurity/54317", "content": "\u203c CVE-2022-43542 \u203c\n\nVulnerabilities in the Aruba EdgeConnect Enterprise command line interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T16:25:59.000000Z"}, {"uuid": "2bd4f00d-fd6b-404a-a280-a84091495d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43546", "type": "seen", "source": "https://t.me/cibsecurity/52632", "content": "\u203c CVE-2022-43546 \u203c\n\nA vulnerability has been identified in POWER METER SICAM Q100 (All versions &lt; V2.50), POWER METER SICAM Q100 (All versions &lt; V2.50). Affected devices do not properly validate the EndTime-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-08T14:35:24.000000Z"}, {"uuid": "b8ff7851-0c59-4701-9df4-e7084b1d3472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43543", "type": "seen", "source": "https://t.me/cibsecurity/55046", "content": "\u203c CVE-2022-43543 \u203c\n\nKDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character's specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T12:13:28.000000Z"}, {"uuid": "663b985d-a797-4d9b-aa87-5f4eef23b2c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43545", "type": "seen", "source": "https://t.me/cibsecurity/52630", "content": "\u203c CVE-2022-43545 \u203c\n\nA vulnerability has been identified in POWER METER SICAM Q100 (All versions &lt; V2.50), POWER METER SICAM Q100 (All versions &lt; V2.50). Affected devices do not properly validate the RecordType-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-08T14:35:19.000000Z"}, {"uuid": "843c9f06-584b-4eab-8d72-9387d35df92e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43548", "type": "seen", "source": "https://t.me/cibsecurity/54037", "content": "\u203c CVE-2022-43548 \u203c\n\nA OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1, &lt;16.18.1, &lt;18.12.1, &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:30.000000Z"}, {"uuid": "d76f0856-59eb-4036-902f-845b6c935075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43549", "type": "seen", "source": "https://t.me/cibsecurity/54033", "content": "\u203c CVE-2022-43549 \u203c\n\nImproper authentication in Veeam Backup for Google Cloud v1.0 and v3.0 allows attackers to bypass authentication mechanisms.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:26.000000Z"}]}