{"vulnerability": "CVE-2022-2612", "sightings": [{"uuid": "7f1327de-48f2-4a3a-8a53-151ce14fc23c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26124", "type": "seen", "source": "Telegram/RIqRThgNVthOpbAXegfLEm0n2Ft6zgDeEQMkLqloIBXqL7Dx", "content": "", "creation_timestamp": "2025-02-06T02:43:29.000000Z"}, {"uuid": "395caa49-2064-432a-b910-0cbc5424eab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2612", "type": "seen", "source": "https://t.me/cibsecurity/48109", "content": "\u203c CVE-2022-2612 \u203c\n\nSide-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-13T00:33:44.000000Z"}, {"uuid": "65230413-00fa-4647-9695-79e97875b015", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26120", "type": "seen", "source": "https://t.me/cibsecurity/46497", "content": "\u203c CVE-2022-26120 \u203c\n\nMultiple improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerabilities [CWE-89] in FortiADC management interface 7.0.0 through 7.0.1, 5.0.0 through 6.2.2 may allow an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-18T22:39:59.000000Z"}, {"uuid": "f2d0688a-a27e-416c-97da-c92ce36c9222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26127", "type": "seen", "source": "https://t.me/cibsecurity/38372", "content": "\u203c CVE-2022-26127 \u203c\n\nA buffer overflow vulnerability exists in FRRouting through 8.1.0 due to missing a check on the input packet length in the babel_packet_examin function in babeld/message.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-03T20:26:17.000000Z"}, {"uuid": "9de9eaf1-3196-474e-91f3-a999a1b248fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26129", "type": "seen", "source": "https://t.me/cibsecurity/38370", "content": "\u203c CVE-2022-26129 \u203c\n\nBuffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-03T20:26:15.000000Z"}, {"uuid": "69577c33-cce3-4a0f-930b-ce1f8e610843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26125", "type": "seen", "source": "https://t.me/cibsecurity/38369", "content": "\u203c CVE-2022-26125 \u203c\n\nBuffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-03T20:26:14.000000Z"}, {"uuid": "412e06bb-9508-4437-91eb-4e4465d0bed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26126", "type": "seen", "source": "https://t.me/cibsecurity/38368", "content": "\u203c CVE-2022-26126 \u203c\n\nBuffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a non-zero-terminated binary string in isis_nb_notifications.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-03T20:26:12.000000Z"}, {"uuid": "eae95690-3f8d-424e-8d80-c2aa9c4cae76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26128", "type": "seen", "source": "https://t.me/cibsecurity/38367", "content": "\u203c CVE-2022-26128 \u203c\n\nA buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-03T20:26:11.000000Z"}, {"uuid": "b1359d74-04ef-402c-b1a6-e3ecb80bb582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26123", "type": "seen", "source": "https://t.me/cibsecurity/59652", "content": "\u203c CVE-2022-26123 \u203c\n\nThis candidate was in a CNA pool that was not assigned to any issues during 2022.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-08T02:23:27.000000Z"}, {"uuid": "6cef8586-ab45-464e-90f1-3b515372acd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26121", "type": "seen", "source": "https://t.me/cibsecurity/51064", "content": "\u203c CVE-2022-26121 \u203c\n\nAn exposure of resource to wrong sphere vulnerability [CWE-668] in FortiAnalyzer and FortiManager GUI 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11, 5.6.0 through 5.6.11 may allow an unauthenticated and remote attacker to access report template images via referencing the name in the URL path.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-10T18:24:57.000000Z"}, {"uuid": "8356bb61-39d3-4896-806f-4376956f45b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26124", "type": "seen", "source": "https://t.me/cibsecurity/52870", "content": "\u203c CVE-2022-26124 \u203c\n\nImproper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:39:21.000000Z"}]}