{"vulnerability": "cve-2022-4583", "sightings": [{"uuid": "1b6a5875-b667-45a8-89cb-0fb27aad5910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45830", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lerele3jke22", "content": "", "creation_timestamp": "2025-01-02T15:15:42.360526Z"}, {"uuid": "e5958b96-da5b-482b-b75a-3b79920f33d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45830", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lergv4udxs2u", "content": "", "creation_timestamp": "2025-01-02T15:56:57.087226Z"}, {"uuid": "5a2ea2a9-8b80-4aad-877b-e51cfd6687d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "dae853c8-467c-468c-8f67-7e78ffd7e1b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "e703e513-126b-43c9-b857-c4d610d43318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "5add29bf-b572-483a-aefe-cb8870828e77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "44f6646c-8d2f-4409-9e3c-42b4dde5d5c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "b23485a5-c6a4-4f0e-8018-c97f8879e66a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45836", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3meovccickb2q", "content": "", "creation_timestamp": "2026-02-12T21:03:11.299941Z"}, {"uuid": "cac3f96c-3d6e-4d95-b3e4-ef55d3bda1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "4b93b062-763f-4e31-861e-c419ac6a7284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-31)", "content": "", "creation_timestamp": "2025-05-31T00:00:00.000000Z"}, {"uuid": "cdfb6938-7ad4-4045-8864-879f2d3b5413", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "2c7fc29c-3f17-4ed2-a29e-eba1f0862aa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-17)", "content": "", "creation_timestamp": "2025-08-17T00:00:00.000000Z"}, {"uuid": "002be6a7-a74b-49e4-8635-192ff7fb141c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "8fc24d3a-8a88-47fe-ab8c-3c573e831fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45835", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-28)", "content": "", "creation_timestamp": "2025-10-28T00:00:00.000000Z"}, {"uuid": "2ed0451e-3433-42cb-8763-3423c37b2279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45836", "type": "seen", "source": "https://t.me/cibsecurity/62356", "content": "\u203c CVE-2022-45836 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in W3 Eden, Inc. Download Manager plugin &lt;=\u00c2\u00a03.2.59 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-18T18:29:13.000000Z"}, {"uuid": "6e6b2ef6-4ec2-42c6-9de5-31c6e51b24f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45837", "type": "seen", "source": "https://t.me/cibsecurity/62801", "content": "\u203c CVE-2022-45837 \u203c\n\nReflected Cross-Site Scripting (XSS) vulnerability in Denis ???????? plugin &lt;=\u00c2\u00a06.0.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-25T16:25:16.000000Z"}, {"uuid": "0dfdbb96-a79b-439e-bf38-6cbdf26db50b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45830", "type": "seen", "source": "https://t.me/cvedetector/14169", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-45830 - Analytify Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2022-45830 \nPublished : Jan. 2, 2025, 3:15 p.m. | 27\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Analytify.This issue affects Analytify: from n/a through 4.2.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T16:46:15.000000Z"}, {"uuid": "4e5c2c8b-a0ae-4e44-aa74-922c39726711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45833", "type": "seen", "source": "https://t.me/cibsecurity/54107", "content": "\u203c CVE-2022-45833 \u203c\n\nAuth. Path Traversal vulnerability in Easy WP SMTP plugin &lt;= 1.5.1 on WordPress.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-07T00:41:09.000000Z"}, {"uuid": "d6ef565c-9d6b-4b9c-aa82-e42656bd832d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45831", "type": "seen", "source": "https://t.me/cibsecurity/60881", "content": "\u203c CVE-2022-45831 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in biplob018 Image Hover Effects for Elementor with Lightbox and Flipbox plugin &lt;= 2.8 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-28T12:39:05.000000Z"}, {"uuid": "3d7f5180-2a19-4de8-a752-4bf379d7d36a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4583", "type": "seen", "source": "https://t.me/cibsecurity/54805", "content": "\u203c CVE-2022-4583 \u203c\n\nA vulnerability was found in jLEMS. It has been declared as critical. Affected by this vulnerability is the function unpackJar of the file src/main/java/org/lemsml/jlems/io/util/JUtil.java. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 8c224637d7d561076364a9e3c2c375daeaf463dc. It is recommended to apply a patch to fix this issue. The identifier VDB-216169 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-17T16:30:46.000000Z"}]}