{"vulnerability": "CVE-2022-2711", "sightings": [{"uuid": "f380b218-0c99-4737-aee1-d24098af4d36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2711", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15004", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-2711\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Import any XML or CSV File to WordPress plugin before 3.6.9 is not validating the paths of files contained in uploaded zip archives, allowing highly privileged users, such as admins, to write arbitrary files to any part of the file system accessible by the web server via a path traversal vector.\n\ud83d\udccf Published: 2022-11-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T20:25:41.104Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1", "creation_timestamp": "2025-05-05T21:20:21.000000Z"}, {"uuid": "862cbb9e-278c-4a98-b1d5-528d9861c315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27111", "type": "seen", "source": "https://t.me/cibsecurity/40482", "content": "\u203c CVE-2022-27111 \u203c\n\nJfinal_CMS 5.1.0 allows attackers to use the feedback function to send malicious XSS code to the administrator backend and execute it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-11T18:16:25.000000Z"}, {"uuid": "2ac3bcd7-f053-44f6-b329-e9f4e890a6cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27114", "type": "seen", "source": "https://t.me/cibsecurity/42198", "content": "\u203c CVE-2022-27114 \u203c\n\nThere is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img-&gt;width' and 'img-&gt;height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-09T20:36:48.000000Z"}, {"uuid": "c2118ddf-be82-408f-a7ed-e9172887a573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-27110", "type": "seen", "source": "https://t.me/cibsecurity/40237", "content": "\u203c CVE-2022-27110 \u203c\n\nOrangeHRM 4.10 is vulnerable to a Host header injection redirect via viewPersonalDetails endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-06T18:31:23.000000Z"}]}