{"vulnerability": "CVE-2022-4122", "sightings": [{"uuid": "15f07449-457a-4eae-b45c-6ffe9fafaaf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "8e96e4f4-7ad5-40a1-b810-0611ec331b59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971769", "content": "", "creation_timestamp": "2024-12-24T20:33:50.619831Z"}, {"uuid": "8bf0738e-fc34-47ab-be6e-b424a836359f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3091d4e1-f08b-4bc6-9a3b-6ba2333289e0", "content": "", "creation_timestamp": "2026-02-02T12:27:04.768558Z"}, {"uuid": "924c6fcb-4283-47fb-9f9b-b6aff9b01e0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41227", "type": "seen", "source": "https://t.me/cibsecurity/50204", "content": "\u203c CVE-2022-41227 \u203c\n\nA cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-21T20:41:15.000000Z"}, {"uuid": "8edd1830-96cb-4374-aa75-930ddf09d907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41229", "type": "seen", "source": "https://t.me/cibsecurity/50201", "content": "\u203c CVE-2022-41229 \u203c\n\nJenkins NS-ND Integration Performance Publisher Plugin 4.8.0.134 and earlier does not escape configuration options of the Execute NetStorm/NetCloud Test build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-21T20:41:12.000000Z"}, {"uuid": "13e9b6e1-7636-47af-ac4c-0e6a25062795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "exploited", "source": "https://t.me/thehackernews/3079", "content": "CISA has updated its Known Exploited Vulnerabilities catalog with three new vulnerabilities that are currently being exploited \u2014 IBM Aspera Faspex (CVE-2022-47986) and Mitel MiVoice Connect (CVE-2022-41223 and CVE-2022-40765).\n\nRead more: https://thehackernews.com/2023/02/us-cybersecurity-agency-cisa-adds-three.html", "creation_timestamp": "2023-02-22T06:49:53.000000Z"}, {"uuid": "30e3c6c1-4721-4ba3-bbb4-61bfcaac11a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:39.000000Z"}, {"uuid": "290acbfb-5353-4f21-a3d6-ca6460b047a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3091d4e1-f08b-4bc6-9a3b-6ba2333289e0", "content": "", "creation_timestamp": "2026-02-02T12:27:04.768558Z"}, {"uuid": "9c1b0f23-b5ce-49ee-8167-a4eae0d5d5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41223", "type": "seen", "source": "Telegram/2I9R6FliHquwURRb8t5QNFGxrnLnYILqhcQxv35YCmjG", "content": "", "creation_timestamp": "2023-02-22T12:24:29.000000Z"}, {"uuid": "51d16463-9309-4833-a32a-7062c52ae4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41222", "type": "seen", "source": "https://t.me/cibsecurity/50177", "content": "\u203c CVE-2022-41222 \u203c\n\nmm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-21T12:40:38.000000Z"}, {"uuid": "394ae546-aa90-4ad0-8248-a0d946cd99a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41226", "type": "seen", "source": "https://t.me/cibsecurity/50217", "content": "\u203c CVE-2022-41226 \u203c\n\nJenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-21T20:41:29.000000Z"}, {"uuid": "e7ab1cf2-6cf3-4f89-a16d-88e9e7a3f72e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4122", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12984", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4122\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.\n\ud83d\udccf Published: 2022-12-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:30:06.788Z\n\ud83d\udd17 References:\n1. https://bugzilla.redhat.com/show_bug.cgi?id=2144983\n2. https://github.com/containers/podman/pull/16315", "creation_timestamp": "2025-04-22T21:04:24.000000Z"}]}