{"vulnerability": "cve-2022-4019", "sightings": [{"uuid": "3cd38eaf-f981-4e05-a764-e87ad1316335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40196", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mcx3j6ayro2o", "content": "", "creation_timestamp": "2026-01-21T16:25:12.533037Z"}, {"uuid": "cb656086-6480-4011-81f1-c5eece57a1ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40198", "type": "seen", "source": "https://t.me/cibsecurity/59224", "content": "\u203c CVE-2022-40198 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in StandaloneTech TeraWallet \u00e2\u20ac\u201c For WooCommerce plugin &lt;= 1.3.24 leading to plugin settings change.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-01T16:33:26.000000Z"}, {"uuid": "a5268fe1-c5af-4371-839a-1fa10c316f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2022-40196", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "e4eb7f4a-7ebd-4433-bb62-3823ebbd7151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40199", "type": "seen", "source": "https://t.me/cibsecurity/50541", "content": "\u203c CVE-2022-40199 \u203c\n\nDirectory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T02:36:24.000000Z"}, {"uuid": "4e4d4b26-cffd-44e9-a2ac-1e7432ffbe38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4019", "type": "seen", "source": "https://t.me/cibsecurity/53408", "content": "\u203c CVE-2022-4019 \u203c\n\nA denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-23T12:13:39.000000Z"}, {"uuid": "e3788a62-383c-442f-a4e3-1af59cac3cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40190", "type": "seen", "source": "https://t.me/cibsecurity/52325", "content": "\u203c CVE-2022-40190 \u203c\n\nSAUTER Controls moduWeb firmware version 2.7.1 is vulnerable to reflective cross-site scripting (XSS). The web application does not adequately sanitize request strings of malicious JavaScript. An attacker utilizing XSS could then execute malicious code in users\u00e2\u20ac\u2122 browsers and steal sensitive information, including user credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T23:13:35.000000Z"}, {"uuid": "1e1cc6a8-23a0-458f-8d1c-b694c81c8f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40193", "type": "seen", "source": "https://t.me/cibsecurity/50328", "content": "\u203c CVE-2022-40193 \u203c\n\nUnauthenticated Stored Cross-Site Scripting (XSS) vulnerability in Awesome Filterable Portfolio plugin &lt;= 1.9.7 at WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T18:13:41.000000Z"}, {"uuid": "73ed33c1-8ec5-42ab-b2f8-a01fcdcff165", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40194", "type": "seen", "source": "https://t.me/cibsecurity/50354", "content": "\u203c CVE-2022-40194 \u203c\n\nUnauthenticated Sensitive Information Disclosure vulnerability in Customer Reviews for WooCommerce plugin &lt;= 5.3.5 at WordPress\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-23T20:43:41.000000Z"}, {"uuid": "358bf4e8-9a5e-414c-b150-c0cf6084c8c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-40191", "type": "seen", "source": "https://t.me/cibsecurity/49504", "content": "\u203c CVE-2022-40191 \u203c\n\nAuthenticated (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in Ali Khallad's Contact Form By Mega Forms plugin &lt;= 1.2.4 at WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T18:26:35.000000Z"}]}