{"vulnerability": "CVE-2022-4244", "sightings": [{"uuid": "bfd6ca87-c2d6-4b3b-9de4-8d1037ebda5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42449", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14161", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42449\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications\n\ud83d\udccf Published: 2025-04-30T21:01:21.381Z\n\ud83d\udccf Modified: 2025-04-30T21:01:21.381Z\n\ud83d\udd17 References:\n1. https://support.hcl-software.com/csm?id=kb_article&amp;sysparm_article=KB0120722", "creation_timestamp": "2025-04-30T21:15:22.000000Z"}, {"uuid": "303d7b25-43a2-4933-865d-4573829fd120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42449", "type": "seen", "source": "https://t.me/cvedetector/24153", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-42449 - HCL Domino Volt HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-42449 \nPublished : April 30, 2025, 9:15 p.m. | 48\u00a0minutes ago \nDescription : Unsafe default file type filter policy in HCL Domino Volt allows upload of .html file and execution of unsafe JavaScript in deployed applications \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T00:36:50.000000Z"}, {"uuid": "f105b0b4-b321-42ab-ae0a-5c5ac044eba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42445", "type": "seen", "source": "https://t.me/cibsecurity/54301", "content": "\u203c CVE-2022-42445 \u203c\n\nHCL Launch could allow a user with administrative privileges, including \"Manage Security\" permissions, the ability to recover a credential previously saved for performing authenticated LDAP searches.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T16:25:39.000000Z"}, {"uuid": "5fbb3353-1dcc-4195-9ca2-6f67f8cb6547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4244", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lx6f2nqhsn2t", "content": "", "creation_timestamp": "2025-08-24T21:02:21.630708Z"}, {"uuid": "23c68c1b-df01-48ad-a5fa-00e8ed05d7fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42443", "type": "seen", "source": "https://t.me/ctinow/203186", "content": "https://ift.tt/KIf3sUV\nCVE-2022-42443 | IBM Trusteer iOS SDK/Trusteer Android SDK up to 5.6 unrestricted upload (XFDB-238535)", "creation_timestamp": "2024-03-08T09:51:58.000000Z"}, {"uuid": "d2fe42fa-d619-4b67-a4f4-2f2fa8e8942e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42443", "type": "seen", "source": "https://t.me/ctinow/187007", "content": "https://ift.tt/EqitZIo\nCVE-2022-42443", "creation_timestamp": "2024-02-17T18:21:35.000000Z"}, {"uuid": "83283fa1-9a39-4ea4-bec8-07bbcfc9b64f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4244", "type": "seen", "source": "https://t.me/cibsecurity/71018", "content": "\u203c CVE-2022-4244 \u203c\n\nA flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with \"dot-dot-slash (../)\" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-26T00:34:31.000000Z"}, {"uuid": "27acb76e-972e-46b1-99dc-48a7433eca38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42449", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2rxisob62p", "content": "", "creation_timestamp": "2025-04-30T21:55:54.704453Z"}]}