{"vulnerability": "CVE-2022-4821", "sightings": [{"uuid": "456b3e64-5d37-44c9-888b-6391491ed4dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4821", "type": "seen", "source": "https://t.me/cibsecurity/55512", "content": "\u203c CVE-2022-4821 \u203c\n\nA vulnerability classified as problematic was found in FlatPress. This vulnerability affects the function onupload of the file admin/panels/uploader/admin.uploader.php of the component XML File Handler/MD File Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3cc223dec5260e533a84b5cf5780d3a4fbf21241. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217000.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-29T00:12:37.000000Z"}, {"uuid": "94bd0cd0-ab84-44cf-bd85-86abc522a8b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48219", "type": "seen", "source": "https://t.me/ctinow/185149", "content": "https://ift.tt/0Flb1Cj\nCVE-2022-48219", "creation_timestamp": "2024-02-15T00:31:50.000000Z"}, {"uuid": "b24ff1b9-1b9f-49fe-b19d-ac1f585b01a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48217", "type": "seen", "source": "https://t.me/cibsecurity/55914", "content": "\u203c CVE-2022-48217 \u203c\n\n** DISPUTED ** The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is \"it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not.\"\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T22:18:14.000000Z"}, {"uuid": "557eb1e5-bd1f-4ba6-af5c-c4551ecc9913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48216", "type": "seen", "source": "https://t.me/cibsecurity/55890", "content": "\u203c CVE-2022-48216 \u203c\n\nUniswap Universal Router before 1.1.0 mishandles reentrancy. This would have allowed theft of funds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T18:18:09.000000Z"}]}