{"vulnerability": "CVE-2022-4087", "sightings": [{"uuid": "94d7d799-9f07-46e0-955c-269b74a2b7b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40876", "type": "seen", "source": "https://t.me/cibsecurity/52181", "content": "\u203c CVE-2022-40876 \u203c\n\nIn Tenda ax1803 v1.0.0.1, the http requests handled by the fromAdvSetMacMtuWan functions, wanSpeed, cloneType, mac, can cause a stack overflow and enable remote code execution (RCE).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-28T00:28:56.000000Z"}, {"uuid": "1a398037-3d7b-4dd8-ac98-da6a0d9a9c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4087", "type": "seen", "source": "https://t.me/cibsecurity/53232", "content": "\u203c CVE-2022-4087 \u203c\n\nA vulnerability was found in iPXE. It has been declared as problematic. This vulnerability affects the function tls_new_ciphertext of the file src/net/tls.c of the component TLS. The manipulation of the argument pad_len leads to information exposure through discrepancy. The name of the patch is 186306d6199096b7a7c4b4574d4be8cdb8426729. It is recommended to apply a patch to fix this issue. VDB-214054 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-08T09:16:32.000000Z"}, {"uuid": "98fa823a-be10-45d3-b301-16f72554df49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40871", "type": "seen", "source": "https://t.me/cibsecurity/51262", "content": "\u203c CVE-2022-40871 \u203c\n\nDolibarr ERP &amp; CRM &lt;=15.0.3 is vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-12T16:26:42.000000Z"}, {"uuid": "74c0b940-c6de-451f-995e-5425e540a346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40877", "type": "seen", "source": "https://t.me/cibsecurity/50552", "content": "\u203c CVE-2022-40877 \u203c\n\nExam Reviewer Management System 1.0 is vulnerable to SQL Injection via the \u00e2\u20ac\u02dcid\u00e2\u20ac\u2122 parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T02:36:40.000000Z"}, {"uuid": "aa21013a-ef2c-4821-999e-cd8556c72f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40878", "type": "seen", "source": "https://t.me/cibsecurity/50544", "content": "\u203c CVE-2022-40878 \u203c\n\nIn Exam Reviewer Management System 1.0, an authenticated attacker can upload a web-shell php file in profile page to achieve Remote Code Execution (RCE).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T02:36:27.000000Z"}, {"uuid": "e4a5ceaa-88e9-41f6-bbba-5bdb6e73d6b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40872", "type": "seen", "source": "https://t.me/cibsecurity/50964", "content": "\u203c CVE-2022-40872 \u203c\n\nAn SQL injection vulnerability issue was discovered in Sourcecodester Simple E-Learning System 1.0., in /vcs/classRoom.php?classCode=, classCode.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-07T14:17:26.000000Z"}]}