{"vulnerability": "cve-2022-3317", "sightings": [{"uuid": "421caf19-7a07-4ac0-8970-8ea051982807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33171", "type": "published-proof-of-concept", "source": "Telegram/LcY7eBFwAwyzwe0Kauf_IGSBHQfjWzlBSbPNDVNgDN2U1XQ", "content": "", "creation_timestamp": "2025-12-08T15:00:08.000000Z"}, {"uuid": "80593096-1843-4269-9608-29304ab70e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3317", "type": "seen", "source": "https://t.me/cibsecurity/52426", "content": "\u203c CVE-2022-3317 \u203c\n\nInsufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chrome security severity: Low)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T23:23:48.000000Z"}, {"uuid": "e5a28249-22af-4830-bba5-8eba2cf513cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33176", "type": "seen", "source": "https://t.me/cibsecurity/52886", "content": "\u203c CVE-2022-33176 \u203c\n\nImproper input validation in BIOS firmware for some Intel(R) NUC 11 Performance kits and Intel(R) NUC 11 Performance Mini PCs before version PATGL357.0042 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:45:16.000000Z"}, {"uuid": "a0741f80-ca16-4c39-9e24-844e7c2091c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33171", "type": "seen", "source": "https://t.me/cibsecurity/45571", "content": "\u203c CVE-2022-33171 \u203c\n\n** DISPUTED ** The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-04T20:12:37.000000Z"}, {"uuid": "1d20103f-19fa-4d5e-b794-1d07ef9fb5b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33179", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-33179\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, and 7.4.2j could allow a local authenticated user to break out of restricted shells with \u201cset context\u201d and escalate privileges.\n\ud83d\udccf Published: 2022-10-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T17:12:03.847Z\n\ud83d\udd17 References:\n1. https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2079\n2. https://security.netapp.com/advisory/ntap-20230127-0004/", "creation_timestamp": "2025-05-09T17:25:37.000000Z"}, {"uuid": "15e3a613-bb81-4781-a5dc-a0147b787f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33174", "type": "published-proof-of-concept", "source": "Telegram/jDTJv5vdDO_NJ5ocZ9Zi8eKqPT-dgeKMzSES2q4EMqC8Ow", "content": "", "creation_timestamp": "2022-09-03T07:58:36.000000Z"}, {"uuid": "e50c2b7b-a6d0-4e60-8971-6aaa0fff3ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33179", "type": "seen", "source": "https://t.me/cibsecurity/52082", "content": "\u203c CVE-2022-33179 \u203c\n\nA vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, and 7.4.2j could allow a local authenticated user to break out of restricted shells with \u00e2\u20ac\u0153set context\u00e2\u20ac\ufffd and escalate privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-26T23:59:47.000000Z"}, {"uuid": "df2923eb-3516-46ce-aeff-57954c707a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33178", "type": "seen", "source": "https://t.me/cibsecurity/52077", "content": "\u203c CVE-2022-33178 \u203c\n\nA vulnerability in the radius authentication system of Brocade Fabric OS before Brocade Fabric OS 9.0 could allow a remote attacker to execute arbitrary code on the Brocade switch.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-26T00:26:52.000000Z"}, {"uuid": "47916c22-f81d-4fd6-93af-630658d0db07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33174", "type": "published-proof-of-concept", "source": "Telegram/iNgfm7PxWq0OPcsI0ORoqfQ9sUHM4cWOiqrM1s2RVqxP", "content": "", "creation_timestamp": "2022-09-02T15:45:41.000000Z"}, {"uuid": "7179c73d-ab89-4505-b642-cdd56f1340c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33174", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3074", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPowertek PDU\u8eab\u4efd\u7ed5\u8fc7\nURL\uff1ahttps://github.com/Henry4E36/CVE-2022-33174\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-09-02T07:31:21.000000Z"}, {"uuid": "01d0e683-dbc0-483d-8864-7b8f06e9dbc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33174", "type": "published-proof-of-concept", "source": "https://t.me/tafemaher/19244", "content": "https://github.com/Henry4E36/CVE-2022-33174\n\nFollow: Kingsman", "creation_timestamp": "2022-09-02T09:46:27.000000Z"}, {"uuid": "1f5f0c63-2fe0-4bc8-92a1-184397029585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33172", "type": "seen", "source": "https://t.me/cibsecurity/48639", "content": "\u203c CVE-2022-33172 \u203c\n\nde.fac2 1.34 allows bypassing the User Presence protection mechanism when there is malware on the victim's PC.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-24T16:27:36.000000Z"}, {"uuid": "aec0a9e3-4956-409e-b189-a00f3019c214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33173", "type": "seen", "source": "https://t.me/cibsecurity/46030", "content": "\u203c CVE-2022-33173 \u203c\n\nAn algorithm-downgrade issue was discovered in Couchbase Server before 7.0.4. Analytics Remote Links may temporarily downgrade to non-TLS connection to determine the TLS port number, using SCRAM-SHA instead.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:36:15.000000Z"}]}