{"vulnerability": "cve-2022-4336", "sightings": [{"uuid": "923a9cfe-ce78-4fbf-81f2-0aba844d01da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43367", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16045", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43367\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: IP-COM EW9 V15.11.0.14(9732) was discovered to contain a command injection vulnerability in the formSetDebugCfg function.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T19:43:45.245Z\n\ud83d\udd17 References:\n1. https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/2_cmdi.md", "creation_timestamp": "2025-05-12T20:29:47.000000Z"}, {"uuid": "89e678e7-9af1-4a9a-9083-97b64d93dabb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43366", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16044", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43366\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to access sensitive information via the checkLoginUser, ate, telnet, version, setDebugCfg, and boot interfaces.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T19:47:11.132Z\n\ud83d\udd17 References:\n1. https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/4_information_disclosure.md", "creation_timestamp": "2025-05-12T20:29:44.000000Z"}, {"uuid": "75d7714a-4714-46f3-a7de-70486706a9fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43365", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16043", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43365\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: IP-COM EW9 V15.11.0.14(9732) was discovered to contain a buffer overflow in the formSetDebugCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T19:49:54.325Z\n\ud83d\udd17 References:\n1. https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/1_bof.md", "creation_timestamp": "2025-05-12T20:29:43.000000Z"}, {"uuid": "6d8177ef-73b2-4748-babd-dca792e47918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43364", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43364\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An access control issue in the password reset page of IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to arbitrarily change the admin password.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T19:51:05.373Z\n\ud83d\udd17 References:\n1. https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/5_reset_the_password.md", "creation_timestamp": "2025-05-12T20:29:42.000000Z"}, {"uuid": "8971d575-a718-4d31-a854-c657fd3500ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43361", "type": "seen", "source": "https://t.me/cibsecurity/52414", "content": "\u203c CVE-2022-43361 \u203c\n\nSenayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the component pop_chart.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T22:09:01.000000Z"}, {"uuid": "46e0668d-514e-4406-b131-693396bbcd46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43362", "type": "seen", "source": "https://t.me/cibsecurity/52404", "content": "\u203c CVE-2022-43362 \u203c\n\nSenayan Library Management System v9.4.2 was discovered to contain a SQL injection vulnerability via the collType parameter at loan_by_class.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-01T21:18:58.000000Z"}, {"uuid": "afb78064-9bdc-44f8-929b-c30dfc552198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4336", "type": "seen", "source": "https://t.me/cibsecurity/54233", "content": "\u203c CVE-2022-4336 \u203c\n\nIn BAOTA linux panel there exists a stored xss vulnerability attackers can use to obtain sensitive information via the log analysis feature.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-09T20:18:44.000000Z"}, {"uuid": "7049f77f-2b6e-4651-a135-55938ada0e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43369", "type": "seen", "source": "https://t.me/cibsecurity/54094", "content": "\u203c CVE-2022-43369 \u203c\n\nAutoTaxi Stand Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component search.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T22:41:02.000000Z"}, {"uuid": "f0393d7e-46e6-4906-a2c4-b022b6d8edd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43363", "type": "seen", "source": "https://t.me/cibsecurity/54064", "content": "\u203c CVE-2022-43363 \u203c\n\n** DISPUTED ** Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T18:41:12.000000Z"}]}