{"vulnerability": "cve-2022-2120", "sightings": [{"uuid": "517ea3af-06d1-4a13-8ed5-c8b4d8b57e42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21200", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq7cgizgbx27", "content": "", "creation_timestamp": "2025-05-28T03:51:35.924536Z"}, {"uuid": "56efd8db-5fa5-4196-b7f2-f05e9e7f690a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21209", "type": "seen", "source": "https://t.me/cibsecurity/38132", "content": "\u203c CVE-2022-21209 \u203c\n\nThe affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-25T22:21:21.000000Z"}, {"uuid": "07c1390e-4700-4bb9-aacd-9217ece78da2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21201", "type": "seen", "source": "https://t.me/cibsecurity/47667", "content": "\u203c CVE-2022-21201 \u203c\n\nA stack-based buffer overflow vulnerability exists in the confers ucloud_add_node_new functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-06T02:21:07.000000Z"}, {"uuid": "f39b8e7e-0504-467d-93a7-6fa8c5249d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21202", "type": "seen", "source": "https://t.me/cibsecurity/40623", "content": "\u203c CVE-2022-21202 \u203c\n\nThe affected product is vulnerable to an out-of-bounds read, which may result in disclosure of sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-12T20:16:59.000000Z"}, {"uuid": "8c85228d-c1b0-4510-9f7c-65110ee946d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21203", "type": "seen", "source": "https://t.me/cibsecurity/37169", "content": "\u203c CVE-2022-21203 \u203c\n\nImproper permissions in the SafeNet Sentinel driver for Intel(R) Quartus(R) Prime Standard Edition before version 21.1 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-10T02:19:31.000000Z"}]}