{"vulnerability": "CVE-2022-4464", "sightings": [{"uuid": "d019684e-8630-4541-970d-ef300a1ef32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44643", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11897", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44643\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability in the label-based access control of Grafana Labs Grafana Enterprise Metrics allows an attacker more access than intended. If an access policy which has label selector restrictions also has been granted access to all tenants in the system, the label selector restrictions will not be applied when using this policy with the affected versions of the software. This issue affects: Grafana Labs Grafana Enterprise Metrics GEM 1.X versions prior to 1.7.1 on AMD64; GEM 2.X versions prior to 2.3.1 on AMD64.\n\ud83d\udccf Published: 2022-12-21T01:21:43.830Z\n\ud83d\udccf Modified: 2025-04-15T19:37:40.397Z\n\ud83d\udd17 References:\n1. https://grafana.com/docs/enterprise-metrics/v2.4.x/downloads/#v171----november-14th-2022\n2. https://grafana.com/docs/enterprise-metrics/v2.4.x/downloads/#v231----november-14th-2022", "creation_timestamp": "2025-04-15T19:55:31.000000Z"}, {"uuid": "0f89d81c-f622-424c-9611-5ff59bc2e06b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44641", "type": "seen", "source": "https://t.me/cibsecurity/53183", "content": "\u203c CVE-2022-44641 \u203c\n\nIn Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-19T00:29:42.000000Z"}, {"uuid": "f6f9f516-49f2-4ba4-a5e4-913acf9c0d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44644", "type": "seen", "source": "https://t.me/cibsecurity/57213", "content": "\u203c CVE-2022-44644 \u203c\n\nIn Apache Linkis &lt;=1.3.0 when used with the MySQL Connector/J, an authenticated attacker could read arbitrary local file by connecting a rogue mysql server, By adding allowLoadLocalInfile to true in the jdbc parameter. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis &lt;= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T12:38:02.000000Z"}, {"uuid": "4a580ad1-527d-4304-bb39-e4b5f8fc38a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44643", "type": "seen", "source": "https://t.me/cibsecurity/54976", "content": "\u203c CVE-2022-44643 \u203c\n\nIn Grafana Enterprise Metrics (GEM) before 1.7.1 and 2.x before 2.3.1, after creating an Access Policy that is granted access to all tenants as well as specified a specific label matcher, the label matcher is erroneously not propagated to queries performed with this access policy. Thus, more access is granted to the policy than intended.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-20T18:13:03.000000Z"}, {"uuid": "f50520f4-e597-49a9-80ef-9b8ec7064fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44646", "type": "seen", "source": "https://t.me/cibsecurity/52514", "content": "\u203c CVE-2022-44646 \u203c\n\nIn JetBrains TeamCity version before 2022.10, no audit items were added upon editing a user's settings\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-03T17:20:54.000000Z"}, {"uuid": "7a1c39a4-cea6-4791-a712-9bb4e5713fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44649", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44649\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations.\n\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\ud83d\udccf Published: 2022-11-21T17:57:01.330Z\n\ud83d\udccf Modified: 2025-04-29T04:56:02.015Z\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/solution/000291770\n2. https://www.zerodayinitiative.com/advisories/ZDI-22-1619/", "creation_timestamp": "2025-04-29T05:11:10.000000Z"}, {"uuid": "c4ce7d2b-54a4-46fc-8176-5419db857e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44647", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13774", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44648\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations.\n\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThis is similar to, but not the same as CVE-2022-44647.\n\ud83d\udccf Published: 2022-11-21T17:56:45.351Z\n\ud83d\udccf Modified: 2025-04-29T04:57:20.331Z\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/solution/000291770\n2. https://www.zerodayinitiative.com/advisories/ZDI-22-1618/", "creation_timestamp": "2025-04-29T05:11:10.000000Z"}, {"uuid": "ec21c5b6-a39a-4293-a347-a996740b5801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44648", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13774", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44648\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations.\n\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThis is similar to, but not the same as CVE-2022-44647.\n\ud83d\udccf Published: 2022-11-21T17:56:45.351Z\n\ud83d\udccf Modified: 2025-04-29T04:57:20.331Z\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/solution/000291770\n2. https://www.zerodayinitiative.com/advisories/ZDI-22-1618/", "creation_timestamp": "2025-04-29T05:11:10.000000Z"}, {"uuid": "8567eb61-d23d-4d5b-9bd4-78e2abcc6bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44641", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13893", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44641\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service.\n\ud83d\udccf Published: 2022-11-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T19:02:39.780Z\n\ud83d\udd17 References:\n1. https://lists.lavasoftware.org/archives/list/lava-announce%40lists.lavasoftware.org/thread/WHXGQMIZAPW3GCQEXYHC32N2ZAAAIYCY/\n2. https://www.debian.org/security/2023/dsa-5318\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00016.html", "creation_timestamp": "2025-04-29T19:12:18.000000Z"}, {"uuid": "ef37ce5c-d344-439e-9f3b-b7c5274673fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4464", "type": "seen", "source": "https://t.me/cibsecurity/56543", "content": "\u203c CVE-2022-4464 \u203c\n\nThemify Portfolio Post WordPress plugin before 1.2.1 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high privileged users such as admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-16T18:24:13.000000Z"}, {"uuid": "988014db-1740-4f6c-b867-2293db4fdcc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44645", "type": "seen", "source": "https://t.me/cibsecurity/57214", "content": "\u203c CVE-2022-44645 \u203c\n\nIn Apache Linkis &lt;=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis &lt;= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-31T12:38:03.000000Z"}, {"uuid": "c130c03b-eda9-4f40-ba14-19678cabb030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-44649", "type": "seen", "source": "https://t.me/cibsecurity/54315", "content": "\u203c CVE-2022-44649 \u203c\n\nAn out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-12T16:25:56.000000Z"}]}