{"vulnerability": "cve-2022-3395", "sightings": [{"uuid": "d83bdcb8-df0b-4593-82d6-19d67e39f21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3395", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15419", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3395\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP All Export Pro WordPress plugin before 1.7.9 uses the contents of the cc_sql POST parameter directly as a database query, allowing users which has been given permission to run exports to execute arbitrary SQL statements, leading to a SQL Injection vulnerability. By default only users with the Administrator role can perform exports, but this can be delegated to lower privileged users as well.\n\ud83d\udccf Published: 2022-10-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T20:07:02.496Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0", "creation_timestamp": "2025-05-07T20:23:01.000000Z"}, {"uuid": "9ae8c0b2-970c-4669-86a9-5aae2a16ea1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33954", "type": "seen", "source": "https://t.me/cvedetector/13295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-33954 - IBM Robotic Process Automation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2022-33954 \nPublished : Dec. 19, 2024, 1:15 a.m. | 39\u00a0minutes ago \nDescription : IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected credentials. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T03:05:39.000000Z"}, {"uuid": "1f03abba-d204-471f-8fc8-eb91d2c57850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3395", "type": "seen", "source": "https://t.me/cibsecurity/52022", "content": "\u203c CVE-2022-3395 \u203c\n\nThe WP All Export Pro WordPress plugin before 1.7.9 uses the contents of the cc_sql POST parameter directly as a database query, allowing users which has been given permission to run exports to execute arbitrary SQL statements, leading to a SQL Injection vulnerability. By default only users with the Administrator role can perform exports, but this can be delegated to lower privileged users as well.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-25T20:26:51.000000Z"}, {"uuid": "7fcb1ba6-4e1e-4464-a2b7-eb11c32813b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33954", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113676780870003217", "content": "", "creation_timestamp": "2024-12-19T01:00:21.244570Z"}, {"uuid": "6197f9b1-50ba-4583-9421-5a002e077759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-33955", "type": "seen", "source": "https://t.me/cibsecurity/47356", "content": "\u203c CVE-2022-33955 \u203c\n\nIBM CICS TX 11.1 could allow allow an attacker with physical access to the system to execute code due using a back and refresh attack. IBM X-Force ID: 229312.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-01T20:16:55.000000Z"}]}