{"vulnerability": "cve-2022-4054", "sightings": [{"uuid": "69eae210-b9cc-42f6-811e-9dfc06037a25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40540", "type": "seen", "source": "https://t.me/cibsecurity/59830", "content": "\u203c CVE-2022-40540 \u203c\n\nMemory corruption due to buffer copy without checking the size of input while loading firmware in Linux Kernel.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-11T00:21:24.000000Z"}, {"uuid": "b3e7eacc-3999-412e-a591-b0f32a8d5a12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4054", "type": "seen", "source": "https://t.me/cibsecurity/56954", "content": "\u203c CVE-2022-4054 \u203c\n\nAn issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to leak a webhook secret token by changing the webhook URL to an endpoint that allows them to capture request headers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T00:34:07.000000Z"}]}