{"vulnerability": "cve-2022-3742", "sightings": [{"uuid": "7673a54e-3ecf-4c39-b098-df104a330a62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37422", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwmrsaw64m2y", "content": "", "creation_timestamp": "2025-08-17T21:02:27.244629Z"}, {"uuid": "d0065bf4-d623-4183-8c75-4096785418bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3742", "type": "seen", "source": "https://t.me/cibsecurity/69090", "content": "\u203c CVE-2022-3742 \u203c\n\nA potential vulnerability was discovered in LCFC BIOS for some Lenovo consumer notebook models that could allow a local attacker with elevated privileges to execute arbitrary code due to improper buffer validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-24T00:14:11.000000Z"}, {"uuid": "1c3156c9-1ee4-44b4-ac8f-a58a6f29061c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37425", "type": "seen", "source": "https://t.me/cibsecurity/52221", "content": "\u203c CVE-2022-37425 \u203c\n\nImproper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T20:29:32.000000Z"}, {"uuid": "0fc0b504-a20a-43ee-b9c2-ee244d3d6606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37421", "type": "seen", "source": "https://t.me/cibsecurity/53389", "content": "\u203c CVE-2022-37421 \u203c\n\nSilverstripe silverstripe/cms through 4.11.0 allows XSS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-23T07:13:34.000000Z"}, {"uuid": "d21a4716-33de-45dd-854b-29406bc3ff70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37429", "type": "seen", "source": "https://t.me/cibsecurity/53386", "content": "\u203c CVE-2022-37429 \u203c\n\nSilverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 2) via JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-23T07:13:31.000000Z"}, {"uuid": "3e57c21c-875d-4626-b99d-c91f70a1ce0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37424", "type": "seen", "source": "https://t.me/cibsecurity/52230", "content": "\u203c CVE-2022-37424 \u203c\n\nFiles or Directories Accessible to External Parties vulnerability in OpenNebula on Linux allows File Discovery.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T20:29:45.000000Z"}, {"uuid": "c4394745-2a1b-478f-88f7-cca6d42ffba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37426", "type": "seen", "source": "https://t.me/cibsecurity/52228", "content": "\u203c CVE-2022-37426 \u203c\n\nUnrestricted Upload of File with Dangerous Type vulnerability in OpenNebula OpenNebula core on Linux allows File Content Injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T20:29:40.000000Z"}, {"uuid": "7da667d9-bb9a-413c-b8ee-8e31cf2246b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37422", "type": "seen", "source": "https://t.me/cibsecurity/48373", "content": "\u203c CVE-2022-37422 \u203c\n\nPayara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-18T22:29:45.000000Z"}, {"uuid": "3c618bb4-1dc9-4da2-ae0c-8e8d8e5f2001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37428", "type": "seen", "source": "https://t.me/cibsecurity/48615", "content": "\u203c CVE-2022-37428 \u203c\n\nPowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T20:27:50.000000Z"}, {"uuid": "f8ef2e40-fe01-44a1-8622-f958afb4c400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37423", "type": "seen", "source": "https://t.me/cibsecurity/48083", "content": "\u203c CVE-2022-37423 \u203c\n\nNeo4j APOC (Awesome Procedures on Cypher) before 4.3.0.7 and 4.x before 4.4.0.8 allows Directory Traversal to sibling directories via apoc.log.stream.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:46:49.000000Z"}]}