{"vulnerability": "CVE-2022-3259", "sightings": [{"uuid": "6b575bd2-66f0-4b55-ae75-419004ddca24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3259", "type": "seen", "source": "https://t.me/cibsecurity/54229", "content": "\u203c CVE-2022-3259 \u203c\n\nOpenshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-09T20:18:40.000000Z"}, {"uuid": "5cb86966-6a59-4626-888c-f3ed3f345e17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32598", "type": "seen", "source": "https://t.me/cibsecurity/53987", "content": "\u203c CVE-2022-32598 \u203c\n\nIn widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T18:40:11.000000Z"}, {"uuid": "7a25df9e-edb4-48ed-a8a1-e1acf5d481b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32594", "type": "seen", "source": "https://t.me/cibsecurity/53986", "content": "\u203c CVE-2022-32594 \u203c\n\nIn widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446207; Issue ID: ALPS07446207.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T18:40:10.000000Z"}, {"uuid": "ded197c6-cae9-446c-a569-5fec711eff61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32596", "type": "seen", "source": "https://t.me/cibsecurity/53979", "content": "\u203c CVE-2022-32596 \u203c\n\nIn widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446213; Issue ID: ALPS07446213.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T18:39:57.000000Z"}, {"uuid": "d89cd2ad-d3ba-41e2-bb46-fb98f89096cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32597", "type": "seen", "source": "https://t.me/cibsecurity/53988", "content": "\u203c CVE-2022-32597 \u203c\n\nIn widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-05T18:40:12.000000Z"}, {"uuid": "70ead31a-08cf-4f00-825a-51105455e946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32592", "type": "seen", "source": "https://t.me/cibsecurity/51040", "content": "\u203c CVE-2022-32592 \u203c\n\nIn cpu dvfs, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07139405; Issue ID: ALPS07139405.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-08T00:17:50.000000Z"}, {"uuid": "f0b82ecf-c1ee-47c2-91bd-6d3d4e525cc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32590", "type": "seen", "source": "https://t.me/cibsecurity/51038", "content": "\u203c CVE-2022-32590 \u203c\n\nIn wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-08T00:17:48.000000Z"}, {"uuid": "3658ea5f-4933-44fa-aaff-d97d4ba06bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32591", "type": "seen", "source": "https://t.me/cibsecurity/51044", "content": "\u203c CVE-2022-32591 \u203c\n\nIn ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07257259; Issue ID: ALPS07257259.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-08T00:17:55.000000Z"}, {"uuid": "c7db694f-cb1c-43d7-9e55-a79e41da8e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32595", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8962", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-32595\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In widevine, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446236; Issue ID: ALPS07446236.\n\ud83d\udccf Published: 2023-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T20:09:38.068Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/December-2022", "creation_timestamp": "2025-03-26T20:25:51.000000Z"}, {"uuid": "46059630-3316-450f-a3a4-e1a0792c0ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32599", "type": "seen", "source": "Telegram/rVdOU8saIYc-dZKKdWGAuBHipPyrizxLlf4zvHqrGEf8OWo6", "content": "", "creation_timestamp": "2025-02-14T10:05:08.000000Z"}, {"uuid": "a538a4e7-e2b8-4d84-a206-03de9c844453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32593", "type": "seen", "source": "https://t.me/cibsecurity/51036", "content": "\u203c CVE-2022-32593 \u203c\n\nIn vowe, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138493; Issue ID: ALPS07138493.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-08T00:17:46.000000Z"}, {"uuid": "1c000b8d-3a1e-4dbe-9d2c-88827d279f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3259", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12987", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3259\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.\n\ud83d\udccf Published: 2022-12-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:25:52.328Z\n\ud83d\udd17 References:\n1. https://bugzilla.redhat.com/show_bug.cgi?id=2103220", "creation_timestamp": "2025-04-22T21:04:27.000000Z"}, {"uuid": "27a439e8-bb1b-436c-8abd-2bb91b0767de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32595", "type": "seen", "source": "https://t.me/cibsecurity/57590", "content": "\u203c CVE-2022-32595 \u203c\n\nIn widevine, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446236; Issue ID: ALPS07446236.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-06T22:23:46.000000Z"}]}