{"vulnerability": "CVE-2022-4384", "sightings": [{"uuid": "bb462ba9-9076-40d2-9192-247796e4f49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvtzoj62i", "content": "", "creation_timestamp": "2025-04-14T22:38:57.388179Z"}, {"uuid": "43ee2db0-685e-491a-baf2-859fed26b257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmsmvugpix24", "content": "", "creation_timestamp": "2025-04-14T22:38:58.789664Z"}, {"uuid": "5451f661-cd74-422e-8229-f7c9ffdb045f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11699", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43840\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4\n\nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document.\n\ud83d\udccf Published: 2025-04-14T20:43:28.652Z\n\ud83d\udccf Modified: 2025-04-14T20:43:28.652Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:32.000000Z"}, {"uuid": "9ffe1107-4339-4a0c-aece-e93f5f388257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8782", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4384\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.\n\ud83d\udccf Published: 2023-02-06T19:59:16.563Z\n\ud83d\udccf Modified: 2025-03-25T20:41:44.440Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5", "creation_timestamp": "2025-03-25T21:25:31.000000Z"}, {"uuid": "47fd43b2-39e3-4e74-a279-c0222c26ff1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43847\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Aspera Console 3.4.0 through 3.4.4 \n\nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.\n\ud83d\udccf Published: 2025-04-14T20:22:01.813Z\n\ud83d\udccf Modified: 2025-04-14T20:31:15.666Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7169766", "creation_timestamp": "2025-04-14T20:54:39.000000Z"}, {"uuid": "e366ca3a-20e5-41fe-ad16-2772cdd6b16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/207336", "content": "https://ift.tt/J4EHRlC\nCVE-2022-43842 | IBM Aspera Console up to 3.4.2 sql injection (XFDB-239079)", "creation_timestamp": "2024-03-14T01:16:41.000000Z"}, {"uuid": "61c485d9-3979-4e3a-bf1d-3ae998785744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43840", "type": "seen", "source": "https://t.me/cvedetector/22894", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43840 - IBM Aspera Console XPath Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43840 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4  \n  \nis vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:48.000000Z"}, {"uuid": "e35aa835-d14c-4d97-89d8-b0de1f44cbe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43847", "type": "seen", "source": "https://t.me/cvedetector/22895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-43847 - IBM Aspera Console HTTP Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-43847 \nPublished : April 14, 2025, 9:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : IBM Aspera Console 3.4.0 through 3.4.4   \n  \nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T01:32:49.000000Z"}, {"uuid": "88ee9524-8f3e-47df-ba01-c3d093d769c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192132", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:13.000000Z"}, {"uuid": "c5346e32-01a8-41d9-90b0-cd66d6390b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4384", "type": "seen", "source": "https://t.me/cibsecurity/57584", "content": "\u203c CVE-2022-4384 \u203c\n\nThe Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-06T22:23:39.000000Z"}, {"uuid": "de433869-49b0-485d-967a-aa8f15348d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43842", "type": "seen", "source": "https://t.me/ctinow/192129", "content": "https://ift.tt/BCS1E9l\nCVE-2022-43842", "creation_timestamp": "2024-02-23T20:26:09.000000Z"}, {"uuid": "1b700830-7c8f-4752-9c05-7cb9e1671cff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43843", "type": "seen", "source": "https://t.me/ctinow/165835", "content": "https://ift.tt/l7LTJiC\nCVE-2022-43843 | IBM Spectrum Scale 5.1.5.0/5.1.5.1 risky encryption (XFDB-239080)", "creation_timestamp": "2024-01-10T14:36:51.000000Z"}, {"uuid": "be243012-19d9-4f21-8381-c84fe682ae04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43844", "type": "seen", "source": "https://t.me/cibsecurity/55988", "content": "\u203c CVE-2022-43844 \u203c\n\nIBM Robotic Process Automation for Cloud Pak 20.12 through 21.0.3 is vulnerable to broken access control. A user is not correctly redirected to the platform log out screen when logging out of IBM RPA for Cloud Pak. IBM X-Force ID: 239081.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-05T20:19:10.000000Z"}]}