{"vulnerability": "cve-2022-4118", "sightings": [{"uuid": "4b9f8646-bba5-4372-8878-0349abb5a833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41183", "type": "seen", "source": "https://t.me/cibsecurity/51184", "content": "\u203c CVE-2022-41183 \u203c\n\nDue to lack of proper memory management, when a victim opens manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-12T00:26:06.000000Z"}, {"uuid": "dd14d34d-12fa-4f7f-8907-96c17a0b3000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41182", "type": "seen", "source": "https://t.me/cibsecurity/51216", "content": "\u203c CVE-2022-41182 \u203c\n\nDue to lack of proper memory management, when a victim opens manipulated Parasolid Part and Assembly (.x_b, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-12T00:32:30.000000Z"}, {"uuid": "8a1028c4-31c4-40db-80fd-261bc34fe576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41189", "type": "seen", "source": "https://t.me/cibsecurity/51193", "content": "\u203c CVE-2022-41189 \u203c\n\nDue to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-12T00:26:16.000000Z"}, {"uuid": "d5eeaf78-6b03-4c51-a542-be7b248c1087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41180", "type": "seen", "source": "https://t.me/cibsecurity/51188", "content": "\u203c CVE-2022-41180 \u203c\n\nDue to lack of proper memory management, when a victim opens a manipulated Portable Document Format (.pdf, PDFPublishing.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-12T00:26:11.000000Z"}, {"uuid": "7be1c3d9-933f-4e8d-8f4c-703d75bb3622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4118", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3701", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4118\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2023-05-08T14:15:10.883\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4\n2. https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4", "creation_timestamp": "2025-01-31T23:25:09.000000Z"}, {"uuid": "ad1832c5-6794-402b-a65f-73d1df6f21de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41188", "type": "seen", "source": "https://t.me/cibsecurity/51205", "content": "\u203c CVE-2022-41188 \u203c\n\nDue to lack of proper memory management, when a victim opens manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-12T00:32:14.000000Z"}]}