{"vulnerability": "cve-2022-3058", "sightings": [{"uuid": "dda9d7f9-953e-4b0b-acdd-0abda84ffdaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3058", "type": "seen", "source": "https://t.me/cibsecurity/50497", "content": "\u203c CVE-2022-3058 \u203c\n\nUse after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T20:22:43.000000Z"}, {"uuid": "38c59992-9c39-48ce-a550-430b02f979c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30587", "type": "seen", "source": "https://t.me/cibsecurity/43896", "content": "\u203c CVE-2022-30587 \u203c\n\nGradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-07T00:30:24.000000Z"}, {"uuid": "c4e53f24-e85b-4280-835a-eb0bf12b175c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30586", "type": "seen", "source": "https://t.me/cibsecurity/43879", "content": "\u203c CVE-2022-30586 \u203c\n\nGradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-06T22:30:20.000000Z"}, {"uuid": "74c8637d-33f1-47ea-b6b3-56e2d66f4c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30584", "type": "seen", "source": "https://t.me/cibsecurity/43460", "content": "\u203c CVE-2022-30584 \u203c\n\nArcher Platform 6.3 before 6.11 (6.11.0.0) contains an Improper Access Control Vulnerability within SSO ADFS functionality that could potentially be exploited by malicious users to compromise the affected system. 6.10 P3 (6.10.0.3) and 6.9 SP3 P4 (6.9.3.4) are also fixed releases.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-27T00:14:42.000000Z"}, {"uuid": "711eb3da-68d8-4cf1-86f7-47d652601107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30585", "type": "seen", "source": "https://t.me/cibsecurity/43463", "content": "\u203c CVE-2022-30585 \u203c\n\nThe REST API in Archer Platform 6.x before 6.11 (6.11.0.0) contains an Authorization Bypass Vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to view sensitive information. 6.10 P3 (6.10.0.3) and 6.9 SP3 P4 (6.9.3.4) are also fixed releases.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-19T00:05:46.000000Z"}, {"uuid": "4e566e50-3735-4891-ac3f-9fb72dd25d05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30580", "type": "seen", "source": "https://t.me/cibsecurity/47887", "content": "\u203c CVE-2022-30580 \u203c\n\nCode injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either \"..com\" or \"..exe\" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T00:26:10.000000Z"}]}