{"vulnerability": "CVE-2022-3400", "sightings": [{"uuid": "e9bfa8db-11ce-4058-a845-cc5781b322f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34007", "type": "seen", "source": "https://t.me/cibsecurity/45736", "content": "\u203c CVE-2022-34007 \u203c\n\nEQS Integrity Line through 2022-07-01 allows a stored XSS via a crafted whistleblower entry.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-07T16:15:26.000000Z"}, {"uuid": "0d1ca333-275d-46ed-92df-28c97f3d9e41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34008", "type": "seen", "source": "https://t.me/cibsecurity/44910", "content": "\u203c CVE-2022-34008 \u203c\n\nComodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-21T18:27:58.000000Z"}, {"uuid": "7bb60f9b-3e24-4ed5-8a0c-07d062674832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34001", "type": "seen", "source": "https://t.me/cibsecurity/46559", "content": "\u203c CVE-2022-34001 \u203c\n\nUnit4 ERP through 7.9 allows XXE via ExecuteServerProcessAsynchronously.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-19T20:40:47.000000Z"}, {"uuid": "66ff5798-312d-427c-844e-f7381d4f8237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34006", "type": "seen", "source": "https://t.me/cibsecurity/44805", "content": "\u203c CVE-2022-34006 \u203c\n\nAn issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\\SYSTEM, aka NX-I674 (sub-issue 2).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T00:25:38.000000Z"}, {"uuid": "88ca3570-1083-4ba5-af0f-7aa35bf7c764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34000", "type": "seen", "source": "https://t.me/cibsecurity/44804", "content": "\u203c CVE-2022-34000 \u203c\n\nlibjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T00:25:37.000000Z"}, {"uuid": "1930c104-c97f-433b-bcc1-d6939d2df4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34005", "type": "seen", "source": "https://t.me/cibsecurity/44803", "content": "\u203c CVE-2022-34005 \u203c\n\nAn issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-20T00:25:36.000000Z"}, {"uuid": "b154a545-a35a-4614-bdc1-95a512c8bc56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3400", "type": "seen", "source": "https://t.me/cibsecurity/52252", "content": "\u203c CVE-2022-3401 \u203c\n\nThe Bricks theme for WordPress is vulnerable to remote code execution due to the theme allowing site editors to include executable code blocks in website content in versions 1.2 to 1.5.3. This, combined with the missing authorization vulnerability (CVE-2022-3400), makes it possible for authenticated attackers with minimal permissions, such as a subscriber, can edit any page, post, or template on the vulnerable WordPress website and inject a code execution block that can be used to achieve remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T22:29:48.000000Z"}, {"uuid": "b313c550-6d12-4a67-b106-4bc92cd047fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3400", "type": "seen", "source": "https://t.me/cibsecurity/52231", "content": "\u203c CVE-2022-3400 \u203c\n\nThe Bricks theme for WordPress is vulnerable to authorization bypass due to a missing capability check on the bricks_save_post AJAX action in versions 1.0 to 1.5.3. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to edit any page, post, or template on the vulnerable WordPress website.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T20:29:46.000000Z"}]}