{"vulnerability": "cve-2022-2869", "sightings": [{"uuid": "0853a291-c403-4fc4-aa5a-7712353d2d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-28693", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "a206d15f-05ba-4798-a1cf-0daa17786b0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28693", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114004219787292663", "content": "", "creation_timestamp": "2025-02-14T20:52:22.480697Z"}, {"uuid": "1dabb7ba-ee61-411d-bf49-55c80fec6168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28693", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li64qlq6au2o", "content": "", "creation_timestamp": "2025-02-14T21:15:39.052000Z"}, {"uuid": "c3c0f651-8041-4e1f-8ac7-da30f6ba366a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-28697", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0252/", "content": "", "creation_timestamp": "2026-03-09T00:00:00.000000Z"}, {"uuid": "1defd4a9-2136-43cd-978f-dad8fc7cabcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28699", "type": "seen", "source": "https://t.me/cibsecurity/63769", "content": "\u203c CVE-2022-28699 \u203c\n\nImproper input validation for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-10T18:19:58.000000Z"}, {"uuid": "84318377-7218-42ba-a36c-530498adee81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28693", "type": "seen", "source": "https://t.me/cvedetector/18138", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-28693 - Intel Processors Alternative Channel Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-28693 \nPublished : Feb. 14, 2025, 9:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T00:08:36.000000Z"}, {"uuid": "bd7de10d-ecc0-436a-b729-d20cf9b8c5c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28696", "type": "seen", "source": "https://t.me/cibsecurity/48406", "content": "\u203c CVE-2022-28696 \u203c\n\nUncontrolled search path in the Intel(R) Distribution for Python before version 2022.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-19T00:22:51.000000Z"}, {"uuid": "44705a10-3d91-425d-a1d2-2caf76cd9ae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2869", "type": "seen", "source": "https://t.me/cibsecurity/48325", "content": "\u203c CVE-2022-2869 \u203c\n\nlibtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-18T02:40:50.000000Z"}, {"uuid": "3d0bcaf0-371c-466d-9e8b-0c5e02963278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28690", "type": "seen", "source": "https://t.me/cibsecurity/43712", "content": "\u203c CVE-2022-28690 \u203c\n\nThe affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-02T18:38:48.000000Z"}]}