{"vulnerability": "CVE-2022-2718", "sightings": [{"uuid": "ebde7c4a-3c66-4292-8344-b532744c332f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27183", "type": "seen", "source": "https://t.me/cibsecurity/42131", "content": "\u203c CVE-2022-27183 \u203c\n\nThe Monitoring Console app configured in Distributed mode allows for a Reflected XSS in a query parameter in Splunk Enterprise versions before 8.1.4. The Monitoring Console app is a bundled app included in Splunk Enterprise, not for download on SplunkBase, and not installed on Splunk Cloud Platform instances. Note that the Cloud Monitoring Console is not impacted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-06T20:23:13.000000Z"}, {"uuid": "d4db7acd-f8a7-4310-97a4-e77889b01913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27180", "type": "seen", "source": "https://t.me/cibsecurity/63793", "content": "\u203c CVE-2022-27180 \u203c\n\nUncontrolled search path in the Intel(R) MacCPUID software before version 3.2 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:28:53.000000Z"}, {"uuid": "3cfcbe76-dc87-4eaf-9127-702f7edc50f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27187", "type": "seen", "source": "https://t.me/cibsecurity/52860", "content": "\u203c CVE-2022-27187 \u203c\n\nUncontrolled search path element in the Intel(R) Quartus Prime Standard edition software before version 21.1 Patch 0.02std may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:39:05.000000Z"}, {"uuid": "3ea5262b-21b9-4a75-b57f-54bc06d72c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27185", "type": "seen", "source": "https://t.me/cibsecurity/47665", "content": "\u203c CVE-2022-27185 \u203c\n\nA denial of service vulnerability exists in the confctl_set_master_wlan functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to denial of service. An attacker can send packets to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-06T14:20:41.000000Z"}, {"uuid": "d8db46f2-5762-4749-b4b1-78259d0dd925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27180", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2964", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-27180\n\ud83d\udd39 Description: Uncontrolled search path in the Intel(R) MacCPUID software before version 3.2 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2023-05-10T13:17:20.857Z\n\ud83d\udccf Modified: 2025-01-24T17:46:55.483Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00784.html", "creation_timestamp": "2025-01-24T18:05:10.000000Z"}, {"uuid": "9cf8ef79-cb43-4a27-ab77-c4e5f4654eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27189", "type": "seen", "source": "https://t.me/cibsecurity/42026", "content": "\u203c CVE-2022-27189 \u203c\n\nOn F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when an Internet Content Adaptation Protocol (ICAP) profile is configured on a virtual server, undisclosed traffic can cause an increase in Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T20:42:47.000000Z"}]}