{"vulnerability": "CVE-2022-2605", "sightings": [{"uuid": "f8d22ab4-e216-41d1-bd9a-2255eae7cd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26058", "type": "seen", "source": "https://t.me/cibsecurity/59646", "content": "\u203c CVE-2022-26058 \u203c\n\nThis candidate was in a CNA pool that was not assigned to any issues during 2022.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-08T02:23:18.000000Z"}, {"uuid": "d0e6f37d-1196-4da4-a158-3fe4bc564302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26059", "type": "seen", "source": "https://t.me/cibsecurity/39750", "content": "\u203c CVE-2022-26059 \u203c\n\nDelta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in GetQueryData. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T20:11:21.000000Z"}, {"uuid": "9268bc23-83ee-415a-ac07-5188f7ed3dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26055", "type": "seen", "source": "https://t.me/cibsecurity/59653", "content": "\u203c CVE-2022-26055 \u203c\n\nThis candidate was in a CNA pool that was not assigned to any issues during 2022.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-08T02:23:28.000000Z"}, {"uuid": "4fb2d86b-8fdb-42f0-bbce-735fe51b5fb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26052", "type": "seen", "source": "https://t.me/cibsecurity/58375", "content": "\u203c CVE-2022-26052 \u203c\n\nUncontrolled search path element in the Intel(R) MPI Library before version 2021.6 for Intel(R) oneAPI HPC Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:26:49.000000Z"}]}