{"vulnerability": "cve-2022-2438", "sightings": [{"uuid": "5ebf7107-66ac-4b92-a86d-21061e078da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24388", "type": "seen", "source": "https://t.me/cibsecurity/42880", "content": "\u203c CVE-2022-24388 \u203c\n\nVulnerability in rconfig \u00e2\u20ac\u0153date\u00e2\u20ac\ufffd enables an attacker with user level access to the CLI to inject root level commands into Fidelis Network and Deception CommandPost, Collector, Sensor, and Sandbox components as well as neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-18T00:28:06.000000Z"}, {"uuid": "84880bde-ee76-4865-91f2-712257487c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2438", "type": "seen", "source": "https://t.me/cibsecurity/49329", "content": "\u203c CVE-2022-2438 \u203c\n\nThe Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-06T22:13:16.000000Z"}, {"uuid": "f37ebb13-376c-433e-b3ff-9449a57bfdbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24381", "type": "seen", "source": "https://t.me/cibsecurity/48571", "content": "\u203c CVE-2022-24381 \u203c\n\nAll versions of package asneg/opcuastack are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T12:26:13.000000Z"}, {"uuid": "7da8bb2d-d45a-4b09-9e01-40d6a5c414c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24387", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/920", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-24387\n\ud83d\udd39 Description: With administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file. THis is possible in SmarterTrack v100.0.8019.14010\n\ud83d\udccf Published: 2022-03-14T12:15:59\n\ud83d\udccf Modified: 2025-01-09T07:56:43.292Z\n\ud83d\udd17 References:\n1. https://csirt.divd.nl/DIVD-2021-00029\n2. https://csirt.divd.nl/CVE-2022-24387/", "creation_timestamp": "2025-01-09T08:17:35.000000Z"}, {"uuid": "893f25c9-27f7-4731-a7ee-dfb445893c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24384", "type": "seen", "source": "https://t.me/cibsecurity/38858", "content": "\u203c CVE-2022-24384 \u203c\n\nCross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2024-06-29T12:25:16.000000Z"}, {"uuid": "0718213e-9853-438a-a0ef-ee5a155e0e1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24386", "type": "seen", "source": "https://t.me/cibsecurity/38857", "content": "\u203c CVE-2022-24386 \u203c\n\nStored XSS in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-14T15:18:08.000000Z"}, {"uuid": "7c427502-9c4d-4d93-9f5b-db164dde3c4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24387", "type": "seen", "source": "https://t.me/cibsecurity/38856", "content": "\u203c CVE-2022-24387 \u203c\n\nWith administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file. THis is possible in SmarterTrack v100.0.8019.14010\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-14T15:18:07.000000Z"}, {"uuid": "93c9df1d-9dfc-4ce8-b414-5a34782b191a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24385", "type": "seen", "source": "https://t.me/cibsecurity/38855", "content": "\u203c CVE-2022-24385 \u203c\n\nA Direct Object Access vulnerability in SmarterTools SmarterTrack leads to information disclosure This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2024-06-29T12:25:22.000000Z"}]}