{"vulnerability": "cve-2022-1234", "sightings": [{"uuid": "107b3838-eb59-450b-9b56-8f721b4d51a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lr2optruzl25", "content": "", "creation_timestamp": "2025-06-08T01:13:27.249815Z"}, {"uuid": "2979e5ef-9d47-421b-987b-40d9c6afe795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lloezsu5pf2y", "content": "", "creation_timestamp": "2025-03-31T12:42:09.199164Z"}, {"uuid": "b05208af-0e2e-4052-89a6-acd699f0b2ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhuyyo33ch22", "content": "", "creation_timestamp": "2025-02-11T06:14:37.387905Z"}, {"uuid": "af776e58-6917-460b-964b-5c705f773bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhuyyp3p6e2m", "content": "", "creation_timestamp": "2025-02-11T06:14:41.158166Z"}, {"uuid": "9541b16c-f5f1-454f-aaa8-a74b7fe9c2b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhuyypiqky2a", "content": "", "creation_timestamp": "2025-02-11T06:14:42.936121Z"}, {"uuid": "38e42bb6-e0e0-4687-b2e0-ccf1fcb15a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltb4azsqfi2a", "content": "", "creation_timestamp": "2025-07-06T01:22:06.803956Z"}, {"uuid": "67ff9230-b67a-4f79-b883-7d3c175bdf75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwxgpheb7f25", "content": "", "creation_timestamp": "2025-08-22T02:43:14.721574Z"}, {"uuid": "89cd692b-60b1-4556-9928-abe30982b8b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ltb4y22eqc2i", "content": "", "creation_timestamp": "2025-07-06T01:34:56.149652Z"}, {"uuid": "966973fa-6dd2-4eb8-8d4d-a5d7a2c616f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lspojj6zf62k", "content": "", "creation_timestamp": "2025-06-29T03:01:00.864158Z"}, {"uuid": "4f9db926-5a59-4b73-9cac-f0cf353e70f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngzdjg7py2d", "content": "", "creation_timestamp": "2025-04-23T01:14:36.262769Z"}, {"uuid": "b0de6261-93ef-4b0f-9630-02fc8e4264b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5cyghpdot52", "content": "", "creation_timestamp": "2025-11-11T01:31:13.455940Z"}, {"uuid": "4d7a7803-d3ea-4909-a406-001b32b27017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrxavncsat2u", "content": "", "creation_timestamp": "2025-06-19T09:53:21.714226Z"}, {"uuid": "5b56d93e-043a-4a36-a49e-ba2e6bc18888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrxniba3o72o", "content": "", "creation_timestamp": "2025-06-19T13:38:31.427952Z"}, {"uuid": "1de1301b-4730-4ed6-8b2a-45868908cb7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6bee7xtlw2q", "content": "", "creation_timestamp": "2025-11-23T03:24:09.273793Z"}, {"uuid": "301c2491-60b7-4c9a-be2b-82dd13897389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mfv3ofkqt22u", "content": "", "creation_timestamp": "2026-02-28T01:38:23.132283Z"}, {"uuid": "804c03dd-e32e-418a-a998-42711bf7f8da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6do4pv4r42x", "content": "", "creation_timestamp": "2025-11-24T01:24:14.535595Z"}, {"uuid": "e071cbf5-f4a7-40b1-ac3e-8d490c5f9f51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://gist.github.com/christiankopac/0797838ab2b306060a09390db0528458", "content": "", "creation_timestamp": "2026-01-20T10:25:51.000000Z"}, {"uuid": "a8871690-47fb-4530-afe1-c9d4e2974e77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://t.me/cvedetector/23563", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3441 - CVE-2022-1234: Adobe Flash Type Confusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3441 \nPublished : April 22, 2025, 11:15 p.m. | 51\u00a0minutes ago \nDescription : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T02:46:24.000000Z"}, {"uuid": "92a23c2f-2d99-4c0c-b7d6-7f0d59d24db0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlcjgcbm3i2q", "content": "CVE-2026-2710 - CVE-2022-1234: Cisco Webex Meeting Server Authentication Bypass\nCVE ID : CVE-2026-2710\n \n Published : May 7, 2026, 11:16 p.m. | 1\u00a0hour, 9\u00a0minutes ago\n \n Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\n \n...", "creation_timestamp": "2026-05-08T00:54:58.219305Z"}, {"uuid": "097902d4-7943-4818-b6a0-0bfa4945f8f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1234", "type": "seen", "source": "https://t.me/cvedetector/6921", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41987 - TEM Opera Plus FM Family Transmitter Privilege Escalation (CVE-2022-1234)\", \n  \"Content\": \"CVE ID : CVE-2024-41987 \nPublished : Oct. 3, 2024, 6:15 p.m. | 27\u00a0minutes ago \nDescription : The TEM Opera Plus FM Family Transmitter application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T20:48:05.000000Z"}]}