{"vulnerability": "CVE-2022-4830", "sightings": [{"uuid": "460e628b-aef2-4651-adad-fbfdc81b46c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48303", "type": "seen", "source": "https://t.me/arpsyndicate/2029", "content": "#ExploitObserverAlert\n\nCVE-2022-48303\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-48303. GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-18T17:09:42.000000Z"}, {"uuid": "d8ce7282-2a06-4058-a608-be9eb0f63d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48309", "type": "seen", "source": "https://t.me/cibsecurity/59272", "content": "\u203c CVE-2022-48309 \u203c\n\nA CSRF vulnerability allows malicious websites to retrieve logs and technical support archives in Sophos Connect versions older than 2.2.90.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-01T22:33:51.000000Z"}, {"uuid": "b9502c07-66ab-4f7a-96b0-1ac3f9830c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48308", "type": "seen", "source": "https://t.me/cibsecurity/58324", "content": "\u203c CVE-2022-48308 \u203c\n\nIt was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T18:12:28.000000Z"}, {"uuid": "536773a3-9d1a-48b9-93d0-9fe78da34115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48307", "type": "seen", "source": "https://t.me/cibsecurity/58319", "content": "\u203c CVE-2022-48307 \u203c\n\nIt was discovered that the Magritte-ftp was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of a successful man in the middle attack on magritte-ftp, an attacker would be able to read and modify network traffic such as authentication tokens or raw data entering a Palantir Foundry stack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T18:12:24.000000Z"}, {"uuid": "51251a38-ce19-4ae6-bfe5-5af84c07bdb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48306", "type": "seen", "source": "https://t.me/cibsecurity/58316", "content": "\u203c CVE-2022-48306 \u203c\n\nImproper Validation of Certificate with Host Mismatch vulnerability in Gotham Chat IRC helper of Palantir Gotham allows A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. This issue affects: Palantir Palantir Gotham Chat IRC helper versions prior to 30221005.210011.9242.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T18:12:20.000000Z"}, {"uuid": "26a4ec14-bc75-4b5c-bfec-0faf4512b6f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48300", "type": "seen", "source": "https://t.me/cibsecurity/57836", "content": "\u203c CVE-2022-48300 \u203c\n\nThe WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-09T20:26:08.000000Z"}, {"uuid": "c4787370-f9ee-4729-970c-8914cb0c3625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48301", "type": "seen", "source": "https://t.me/cibsecurity/57831", "content": "\u203c CVE-2022-48301 \u203c\n\nThe bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-09T20:26:02.000000Z"}, {"uuid": "17b930ad-332f-4fe2-9a6d-ae879876e92a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48303", "type": "seen", "source": "https://t.me/cibsecurity/57138", "content": "\u203c CVE-2022-48303 \u203c\n\nGNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-30T07:36:48.000000Z"}]}