{"vulnerability": "cve-2022-2515", "sightings": [{"uuid": "d4481005-50d1-4bfa-9e1c-621a9368c195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25154", "type": "seen", "source": "https://t.me/cibsecurity/40146", "content": "\u203c CVE-2022-25154 \u203c\n\nA DLL hijacking vulnerability in Samsung portable SSD T5 PC software before 1.6.9 could allow a local attacker to escalate privileges. (An attacker must already have user privileges on Windows 7, 10, or 11 to exploit this vulnerability.)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T12:28:32.000000Z"}, {"uuid": "d4de882a-4ed5-4c6e-a783-4b3beb5ff3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25156", "type": "seen", "source": "https://t.me/cibsecurity/40027", "content": "\u203c CVE-2022-25156 \u203c\n\nUse of Weak Hash vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions and Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions allows a remote unauthenticated attacker to login to the product by using a password reversed from a previously eavesdropped password hash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-02T02:20:01.000000Z"}, {"uuid": "a1f0396c-cb0e-4c5e-97c1-d6c249f6320c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25159", "type": "seen", "source": "https://t.me/cibsecurity/40050", "content": "\u203c CVE-2022-25159 \u203c\n\nAuthentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions and Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions allows a remote unauthenticated attacker to login to the product by replay attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-02T02:26:11.000000Z"}, {"uuid": "1d1f7428-1e3a-4176-a64d-2c83e5074ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25157", "type": "seen", "source": "https://t.me/cibsecurity/40042", "content": "\u203c CVE-2022-25157 \u203c\n\nUse of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions and Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions allows a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-02T02:20:25.000000Z"}, {"uuid": "0749d7de-fcd9-44e3-a2b1-6b6d8850d472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25150", "type": "seen", "source": "https://t.me/cibsecurity/37443", "content": "\u203c CVE-2022-25150 \u203c\n\nIn Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-14T22:33:01.000000Z"}]}