{"vulnerability": "cve-2022-4296", "sightings": [{"uuid": "cef68521-f85a-4951-95d0-50003815506c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42966", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6095", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42966\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method\n\ud83d\udccf Published: 2022-11-09T00:00:00\n\ud83d\udccf Modified: 2025-03-02T13:24:13.498Z\n\ud83d\udd17 References:\n1. https://research.jfrog.com/vulnerabilities/cleo-redos-xray-257186/", "creation_timestamp": "2025-03-02T13:31:48.000000Z"}, {"uuid": "17b3c2ff-4719-44ff-a375-408a9f4eebbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42964", "type": "seen", "source": "Telegram/RggDYX-ZDqNKfKl-4_o7ptHk79sG8oYe3H4V-bBzkcaa8V9v", "content": "", "creation_timestamp": "2025-02-06T02:40:48.000000Z"}, {"uuid": "a10e5e74-2b72-42a5-9802-fd790505f6ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42967", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42967\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Caret is vulnerable to an XSS attack when the user opens a crafted Markdown file when preview mode is enabled. This directly leads to client-side code execution.\n\ud83d\udccf Published: 2023-01-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-08T14:34:55.464Z\n\ud83d\udd17 References:\n1. https://research.jfrog.com/vulnerabilities/caret-xss-rce/", "creation_timestamp": "2025-04-08T14:46:57.000000Z"}, {"uuid": "626506b8-7ff0-404f-b461-198228baef3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42967", "type": "seen", "source": "https://t.me/cibsecurity/56338", "content": "\u203c CVE-2022-42967 \u203c\n\nCaret is vulnerable to an XSS attack when the user opens a crafted Markdown file when preview mode is enabled. This directly leads to client-side code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-11T16:29:21.000000Z"}, {"uuid": "7c302ddb-2235-4d02-b391-e86cbe398801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42968", "type": "seen", "source": "https://t.me/cibsecurity/51526", "content": "\u203c CVE-2022-42968 \u203c\n\nGitea before 1.17.3 does not sanitize and escape refs in the git backend. Arguments to git commands are mishandled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-16T07:30:24.000000Z"}, {"uuid": "26a52074-1009-438a-82be-0a38039f8880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42969", "type": "seen", "source": "https://t.me/cibsecurity/51527", "content": "\u203c CVE-2022-42969 \u203c\n\nThe py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-16T12:30:35.000000Z"}, {"uuid": "6d3a0b77-dc8e-4e16-b215-69b8b7162c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42961", "type": "seen", "source": "https://t.me/cibsecurity/51522", "content": "\u203c CVE-2022-42961 \u203c\n\nAn issue was discovered in wolfSSL before 5.5.0. A fault injection attack on RAM via Rowhammer leads to ECDSA key disclosure. Users performing signing operations with private ECC keys, such as in server-side TLS connections, might leak faulty ECC signatures. These signatures can be processed via an advanced technique for ECDSA key recovery. (In 5.5.0 and later, WOLFSSL_CHECK_SIG_FAULTS can be used to address the vulnerability.)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-15T07:29:22.000000Z"}]}