{"vulnerability": "CVE-2022-4751", "sightings": [{"uuid": "ae2ed0d7-5300-4fdd-b06d-11425874fbc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47518", "type": "seen", "source": "https://t.me/crackcodes/1919", "content": "#exploit\n1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:\nRemote DoS in Linux kernel WILC1000 wireless driver\nhttps://securitylab.github.com/advisories/GHSL-2022-112_GHSL-2022-115_wilc1000\n\n2. CVE-2022-2602:\nio_uring kernel exploit\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n3. Directory Traversal Vulnerability in Huawei HG255s Products\nhttps://infosecwriteups.com/directory-ttraversal-vulnerability-in-huawei-hg255s-products-dce941a1d015", "creation_timestamp": "2023-01-07T23:30:10.000000Z"}, {"uuid": "b6c384be-9805-405f-8e74-fcf446b1cfe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47519", "type": "seen", "source": "https://t.me/crackcodes/1919", "content": "#exploit\n1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:\nRemote DoS in Linux kernel WILC1000 wireless driver\nhttps://securitylab.github.com/advisories/GHSL-2022-112_GHSL-2022-115_wilc1000\n\n2. CVE-2022-2602:\nio_uring kernel exploit\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n3. Directory Traversal Vulnerability in Huawei HG255s Products\nhttps://infosecwriteups.com/directory-ttraversal-vulnerability-in-huawei-hg255s-products-dce941a1d015", "creation_timestamp": "2023-01-07T23:30:10.000000Z"}, {"uuid": "7c279f3f-5c6a-4738-858b-22c5a16a72a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47517", "type": "seen", "source": "https://t.me/cibsecurity/54813", "content": "\u203c CVE-2022-47517 \u203c\n\nAn issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an off-by-one error.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-18T07:40:29.000000Z"}, {"uuid": "5fbe7a00-edbb-420e-907a-5edd93de9b6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47519", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7399", "content": "#exploit\n1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:\nRemote DoS in Linux kernel WILC1000 wireless driver\nhttps://securitylab.github.com/advisories/GHSL-2022-112_GHSL-2022-115_wilc1000\n\n2. CVE-2022-2602:\nio_uring kernel exploit\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n3. Directory Traversal in Huawei HG255s Products\nhttps://infosecwriteups.com/directory-ttraversal-vulnerability-in-huawei-hg255s-products-dce941a1d015", "creation_timestamp": "2022-12-22T06:30:04.000000Z"}, {"uuid": "ce5e5e0d-1b20-4a09-a57e-61614bde50fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47515", "type": "seen", "source": "https://t.me/cibsecurity/54810", "content": "\u203c CVE-2022-47515 \u203c\n\nAn issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-18T07:40:26.000000Z"}, {"uuid": "d3bb560b-3431-4d5c-ab94-709bbe3748ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47514", "type": "seen", "source": "https://t.me/cibsecurity/54812", "content": "\u203c CVE-2022-47514 \u203c\n\nAn XML external entity (XXE) injection vulnerability in XML-RPC.NET before 2.5.0 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, as demonstrated by a pingback.aspx POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-18T07:40:28.000000Z"}, {"uuid": "0803d3c7-a847-4ffc-9754-3064f0d82b41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47516", "type": "seen", "source": "https://t.me/cibsecurity/54811", "content": "\u203c CVE-2022-47516 \u203c\n\nAn issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-18T07:40:27.000000Z"}, {"uuid": "c0137f36-e166-4884-a680-6fec456559c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47512", "type": "seen", "source": "https://t.me/cibsecurity/54891", "content": "\u203c CVE-2022-47512 \u203c\n\nSensitive information was stored in plain text in a file that is accessible by a user with a local account in Hybrid Cloud Observability (HCO)/ SolarWinds Platform 2022.4. No other versions are affected\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-19T18:16:49.000000Z"}, {"uuid": "00eca21b-4354-4e9c-9093-08016b57460d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47518", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7399", "content": "#exploit\n1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:\nRemote DoS in Linux kernel WILC1000 wireless driver\nhttps://securitylab.github.com/advisories/GHSL-2022-112_GHSL-2022-115_wilc1000\n\n2. CVE-2022-2602:\nio_uring kernel exploit\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n3. Directory Traversal in Huawei HG255s Products\nhttps://infosecwriteups.com/directory-ttraversal-vulnerability-in-huawei-hg255s-products-dce941a1d015", "creation_timestamp": "2022-12-22T06:30:04.000000Z"}]}