{"vulnerability": "CVE-2022-4640", "sightings": [{"uuid": "a955e7d3-f68a-4214-bd83-b988dad7818a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46404", "type": "seen", "source": "https://t.me/cibsecurity/54476", "content": "\u203c CVE-2022-46404 \u203c\n\nA command injection vulnerability has been identified in Atos Unify OpenScape 4000 Assistant and Unify OpenScape 4000 Manager (8 before R2.22.18, 10 before 0.28.13, and 10 R1 before R1.34.4) that may allow an unauthenticated attacker to upload arbitrary files and achieve administrative access to the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-14T00:22:08.000000Z"}, {"uuid": "b4a39ff7-a8c6-4c4a-9bf8-d30cc49abfde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4640", "type": "seen", "source": "https://t.me/cibsecurity/55092", "content": "\u203c CVE-2022-4640 \u203c\n\nA vulnerability has been found in Mingsoft MCMS 5.2.9 and classified as problematic. Affected by this vulnerability is the function save of the component Article Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216499.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-22T00:13:10.000000Z"}, {"uuid": "1959ea43-5e9f-4749-a2e8-c4c0a3b02b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46400", "type": "seen", "source": "https://t.me/cibsecurity/54943", "content": "\u203c CVE-2022-46400 \u203c\n\nThe Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T02:11:54.000000Z"}, {"uuid": "02f542e2-04ea-4416-bf29-36b1f3528601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46405", "type": "seen", "source": "https://t.me/cibsecurity/53958", "content": "\u203c CVE-2022-46405 \u203c\n\nMastodon through 4.0.2 allows attackers to cause a denial of service (large Sidekiq pull queue) by creating bot accounts that follow attacker-controlled accounts on certain other servers associated with a wildcard DNS A record, such that there is uncontrolled recursion of attacker-generated messages.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-04T07:38:37.000000Z"}, {"uuid": "7aa35b54-7d31-446c-989c-a63dcbac9a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46403", "type": "seen", "source": "https://t.me/cibsecurity/54939", "content": "\u203c CVE-2022-46403 \u203c\n\nThe Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) mishandles reject messages.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T02:11:50.000000Z"}, {"uuid": "1d86dc90-ceaa-44ed-9b26-0e131f33e379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46401", "type": "seen", "source": "https://t.me/cibsecurity/54938", "content": "\u203c CVE-2022-46401 \u203c\n\nThe Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T02:11:49.000000Z"}, {"uuid": "0b77afb5-9b23-47cd-bcf7-e878c94bd9f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46402", "type": "seen", "source": "https://t.me/cibsecurity/54937", "content": "\u203c CVE-2022-46402 \u203c\n\nThe Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PairCon_rmSend with incorrect values.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T02:11:48.000000Z"}]}