{"vulnerability": "cve-2022-4696", "sightings": [{"uuid": "b7c7af11-4a32-4180-8263-cdf2d89afc15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46967", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9705", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46967\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An access control issue in Revenue Collection System v1.0 allows unauthenticated attackers to view the contents of /admin/DBbackup/ directory.\n\ud83d\udccf Published: 2023-01-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-31T16:51:20.718Z\n\ud83d\udd17 References:\n1. https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html", "creation_timestamp": "2025-03-31T17:30:51.000000Z"}, {"uuid": "7ea6bd48-cff1-494b-b85a-81728a04d053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46965", "type": "seen", "source": "https://t.me/cibsecurity/57391", "content": "\u203c CVE-2022-46965 \u203c\n\nPrestaShop module, totadministrativemandate before v1.7.1 was discovered to contain a SQL injection vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-02T15:41:26.000000Z"}, {"uuid": "c11da46d-dc60-40e5-b7b1-e428ac1e2ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4696", "type": "seen", "source": "https://t.me/cibsecurity/56340", "content": "\u203c CVE-2022-4696 \u203c\n\nThere exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current-&gt;nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current-&gt;nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T16:29:24.000000Z"}]}