{"vulnerability": "CVE-2022-3297", "sightings": [{"uuid": "5ad672ad-8eef-47fa-8f91-d197d9ea1564", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32972", "type": "seen", "source": "https://t.me/cibsecurity/58429", "content": "\u203c CVE-2022-32972 \u203c\n\nInfoblox BloxOne Endpoint for Windows through 2.2.7 allows DLL injection that can result in local privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T16:13:05.000000Z"}, {"uuid": "64f904e2-f6ce-40bc-9210-a6a60a10e2a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32971", "type": "seen", "source": "https://t.me/cibsecurity/58393", "content": "\u203c CVE-2022-32971 \u203c\n\nImproper authentication in the Intel(R) SUR software before version 2.4.8902 may allow a privileged user to potentially enable escalation of privilege via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-17T00:12:41.000000Z"}, {"uuid": "699f7b56-c631-45fe-9a0b-54590be4c70e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3297", "type": "seen", "source": "https://t.me/cibsecurity/50456", "content": "\u203c CVE-2022-3297 \u203c\n\nUse After Free in GitHub repository vim/vim prior to 9.0.0579.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-25T22:21:20.000000Z"}, {"uuid": "2a86c5b2-09e8-488b-a93f-d27e47077bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32973", "type": "seen", "source": "https://t.me/cibsecurity/44896", "content": "\u203c CVE-2022-32973 \u203c\n\nAn authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-21T18:27:41.000000Z"}, {"uuid": "49aa6772-a2a7-47c8-97e8-9ce469a381cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32974", "type": "seen", "source": "https://t.me/cibsecurity/44904", "content": "\u203c CVE-2022-32974 \u203c\n\nAn authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-21T18:27:49.000000Z"}, {"uuid": "01217ae2-587b-4ffa-943d-137fc35ccef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32978", "type": "seen", "source": "https://t.me/cibsecurity/44202", "content": "\u203c CVE-2022-32978 \u203c\n\nThere is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-10T18:43:39.000000Z"}]}