{"vulnerability": "CVE-2022-4630", "sightings": [{"uuid": "0d3686ea-9479-4eaa-b810-3276baf72112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46300", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2243", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46300\n\ud83d\udd39 Description: Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.\n\ud83d\udccf Published: 2023-03-21T22:10:34.483Z\n\ud83d\udccf Modified: 2025-01-17T22:08:25.887Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05", "creation_timestamp": "2025-01-17T22:57:09.000000Z"}, {"uuid": "3b6e9803-d6ab-412b-a1e3-2546cb6150f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46302", "type": "seen", "source": "https://t.me/cibsecurity/62528", "content": "\u203c CVE-2022-46302 \u203c\n\nBroad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk &lt;= 2.1.0p6, Checkmk &lt;= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-20T18:30:56.000000Z"}, {"uuid": "b0adbb31-acfb-4d99-9a62-31fc52b863db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46309", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11278", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46309\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Vitals ESP upload function has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to access arbitrary system files.\n\ud83d\udccf Published: 2023-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T16:28:01.107Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-6785-86407-1.html", "creation_timestamp": "2025-04-10T16:49:34.000000Z"}, {"uuid": "0ce70e66-c4d6-4502-a53c-3e38941630e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46305", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11276", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46305\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: ChangingTec ServiSign component has a path traversal vulnerability. An unauthenticated LAN attacker can exploit this vulnerability to bypass authentication and access arbitrary system files.\n\ud83d\udccf Published: 2023-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T16:29:34.892Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-6801-bb704-1.html", "creation_timestamp": "2025-04-10T16:49:29.000000Z"}, {"uuid": "abce142c-0f41-4b7a-991e-9f227316f8bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46304", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46304\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: ChangingTec ServiSign component has insufficient filtering for special characters in the connection response parameter. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers command injection and allows the attacker to execute arbitrary system command to perform arbitrary system operation or disrupt service.\n\ud83d\udccf Published: 2023-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T17:46:14.271Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-6800-b5cf6-1.html", "creation_timestamp": "2025-04-10T17:49:08.000000Z"}, {"uuid": "79910827-8358-4590-a188-319334055d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46306", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11277", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46306\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: ChangingTec ServiSign component has a path traversal vulnerability due to insufficient filtering for special characters in the DLL file path. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers the component to load malicious DLL files under arbitrary file path and allows the attacker to perform arbitrary system operation and disrupt of service.\n\ud83d\udccf Published: 2023-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T16:29:15.283Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-6802-4341b-1.html", "creation_timestamp": "2025-04-10T16:49:30.000000Z"}, {"uuid": "90dd3fde-ff0a-4a70-ad79-d06420ff6b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46303", "type": "seen", "source": "https://t.me/cibsecurity/58531", "content": "\u203c CVE-2022-46303 \u203c\n\nCommand injection in SMS notifications in Tribe29 Checkmk &lt;= 2.1.0p10, Checkmk &lt;= 2.0.0p27, and Checkmk &lt;= 1.6.0p29 allows an attacker with User Management permissions, as well as LDAP administrators in certain scenarios, to perform arbitrary commands within the context of the application's local permissions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-20T20:15:56.000000Z"}, {"uuid": "1cf6c4b5-6a77-46e6-a1a4-33fa8ef3b42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4630", "type": "seen", "source": "https://t.me/cibsecurity/55064", "content": "\u203c CVE-2022-4630 \u203c\n\nSensitive Cookie Without 'HttpOnly' Flag in GitHub repository lirantal/daloradius prior to master.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T20:12:55.000000Z"}]}