{"vulnerability": "cve-2022-3369", "sightings": [{"uuid": "866c52f9-3c34-4fb2-9c95-2fcd22700f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3369", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14504", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3369\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: An Improper Access Control vulnerability in the bdservicehost.exe component, as used in Bitdefender Engines for Windows, allows an attacker to delete privileged registry keys by pointing a Registry symlink to a privileged key. This issue affects: Bitdefender Engines versions prior to 7.92659. It also affects Bitdefender Antivirus Free, Bitdefender Antivirus Plus, Bitdefender Internet Security, Bitdefender Total Security, as well as Bitdefender Endpoint Security Tools for Windows with engine versions prior to 7.92659.\n\ud83d\udccf Published: 2022-11-01T07:45:19.436Z\n\ud83d\udccf Modified: 2025-05-02T16:06:44.011Z\n\ud83d\udd17 References:\n1. https://www.bitdefender.com/support/security-advisories/improper-handling-of-registry-symbolic-links-in-bitdefender-engines-va-10562", "creation_timestamp": "2025-05-02T16:15:56.000000Z"}, {"uuid": "683add1b-ee43-446d-b15b-64e1425e6a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33693", "type": "seen", "source": "https://t.me/cibsecurity/46007", "content": "\u203c CVE-2022-33693 \u203c\n\nExposure of Sensitive Information in CID Manager prior to SMR Jul-2022 Release 1 allows local attacker to access iccid via log.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:26:04.000000Z"}, {"uuid": "5e757849-df70-4563-bfe0-1eb46fc69734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33690", "type": "seen", "source": "https://t.me/cibsecurity/46033", "content": "\u203c CVE-2022-33690 \u203c\n\nImproper input validation in Contacts Storage prior to SMR Jul-2022 Release 1 allows attacker to access arbitrary file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:36:19.000000Z"}, {"uuid": "f0ee00a0-5e7f-4f7b-9941-05e1f48496c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33694", "type": "seen", "source": "https://t.me/cibsecurity/46017", "content": "\u203c CVE-2022-33694 \u203c\n\nExposure of Sensitive Information in CSC application prior to SMR Jul-2022 Release 1 allows local attacker to access wifi information via unprotected intent broadcasting.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-12T18:30:19.000000Z"}]}