{"vulnerability": "CVE-2022-2684", "sightings": [{"uuid": "5f9da14f-c953-4079-affe-ae21f2f73c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26843", "type": "seen", "source": "https://t.me/cibsecurity/58386", "content": "\u203c CVE-2022-26843 \u203c\n\nInsufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:27:04.000000Z"}, {"uuid": "20a7f907-9105-4e9a-bc93-098efb839a23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26840", "type": "seen", "source": "https://t.me/cibsecurity/58356", "content": "\u203c CVE-2022-26840 \u203c\n\nImproper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:17:47.000000Z"}, {"uuid": "1862aabd-f889-45f5-bb39-1143cdc877f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26841", "type": "seen", "source": "https://t.me/cibsecurity/58368", "content": "\u203c CVE-2022-26841 \u203c\n\nInsufficient control flow management for the Intel(R) SGX SDK software for Linux before version 2.16.100.1 may allow an authenticated user to potentially enable information disclosure via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:23:13.000000Z"}, {"uuid": "9696524c-50a7-4584-81cd-be0711d3d0b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26845", "type": "seen", "source": "https://t.me/cibsecurity/52926", "content": "\u203c CVE-2022-26845 \u203c\n\nImproper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:52:23.000000Z"}, {"uuid": "62748257-b564-437f-90aa-49526c3757a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26844", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5332", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-26844\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insufficiently protected credentials in the installation binaries for Intel(R) SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2022-08-18T19:58:27.000Z\n\ud83d\udccf Modified: 2025-02-25T17:14:15.216Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html", "creation_timestamp": "2025-02-25T17:23:16.000000Z"}]}