{"vulnerability": "CVE-2022-28672", "sightings": [{"uuid": "790bd57c-5b44-45cd-9036-f0ed166cfc62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/netrunnerz/432", "content": "Foxit PDF Reader CVE-2022-28672 RCE: \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u043f\u0440\u0438 \u043e\u0446\u0435\u043d\u043a\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f PDF. \u041d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c use-after-free \u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0431\u0430\u0433\u043e\u0432 \u0432 Foxit PDF Reader \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u0430. \u041c\u044b \u0441\u043c\u043e\u0433\u043b\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 Foxit PDF Reader.\n\n#CVE #RCE #\u043c\u043e\u044f\u0441\u0442\u0430\u0442\u044c\u044f", "creation_timestamp": "2023-03-22T08:20:49.000000Z"}, {"uuid": "e953a9fe-91cc-413c-8ddf-fb317a5b0bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/poxek/2771", "content": "Foxit PDF Reader CVE-2022-28672 RCE: \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u043f\u0440\u0438 \u043e\u0446\u0435\u043d\u043a\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f PDF. \u041d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c use-after-free \u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0440\u0443\u0433\u0438\u0445 \u0431\u0430\u0433\u043e\u0432 \u0432 Foxit PDF Reader \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u0430. \u041c\u044b \u0441\u043c\u043e\u0433\u043b\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 Foxit PDF Reader.\n\n#CVE #RCE #\u043c\u043e\u044f\u0441\u0442\u0430\u0442\u044c\u044f", "creation_timestamp": "2023-03-21T13:02:26.000000Z"}, {"uuid": "865c8d04-8733-41f6-b5b7-6e4757603456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/3436", "content": "\u200b\u200bCVE-2022-25765 \n\npdfkit Exploit Reverse Shell\n\npdfkit &lt;0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765\n\nhttps://github.com/CyberArchitect1/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell\n\n\u200b\u200bCVE-2022-45025\n\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\n\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n\u200b\u200bCVE-2022-36537\n\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\n\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT\n\n\u200b\u200bCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bCVE-2022-45771 - Pwndoc LFI to RCE\n\nPwndoc local file inclusion to remote code execution of Node.js code on the server.\n\nhttps://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE\n\n\u200b\u200bCVE-2022-46169\n\nCacti remote_agent.php Unauthenticated Command Injection.\n\nhttps://github.com/0xf4n9x/CVE-2022-46169\n\n\u200b\u200bCVE-2022-45451\n\nPoC for CVE-2022-45451 Acronis Arbitrary File Read\n\nhttps://github.com/alfarom256/CVE-2022-45451\n\nCVE-2022-28672\n\nThis bug was Use after Free caused by improper handling of javascript object memory references.\n\nhttps://github.com/hacksysteam/CVE-2022-28672\n\nUse after Free - RCE Exploit: https://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n\n\u200b\u200bCVE-2003-0358\n\nBuffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges &gt; via a long -s command line option.\n\nhttps://github.com/snowcra5h/CVE-2003-0358\n\n\u200b\u200bCVE-2022-39253\n\nDocker host file read\n\nhttps://github.com/ssst0n3/docker-cve-2022-39253-poc\n\n\u200b\u200bCVE-2022-48870\n\nmaccms admin+ xss attacks\n\nhttps://github.com/Cedric1314/CVE-2022-48870\n\n\u200b\u200bCVE-2022-2602\n\nPoC Kernel Privilege Escalation Linux\n\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n\u200b\u200bEvilWfshbr\n\nCVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation\n\nhttps://github.com/kkent030315/CVE-2022-42046\n\n\u200b\u200bCVE-2022-2602\n\nThis repository contains exploits for CVE-2022-2602. There are two versions of it:\n\n\u25ab\ufe0f Exploit using userfaultfd technique.\n\u25ab\ufe0f Exploit using inode locking technique.\n\nhttps://github.com/LukeGix/CVE-2022-2602\n\n#cve #poc \n@pfkgit", "creation_timestamp": "2023-01-28T19:14:38.000000Z"}, {"uuid": "e503c241-409e-4feb-b3f9-b10825be14d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/leakfb/1598", "content": "\u2b50 Foxit PDF Reader UAF RCE Exploit JIT Spraying(CVE-2022-28672)\n\nDownload: https://hydramarket.co/Threads-foxit-pdf-reader-uaf-rce-exploit-jit-spraying-cve-2022-28672", "creation_timestamp": "2023-02-14T21:12:13.000000Z"}, {"uuid": "ac2ef828-cb7e-4e1d-96e0-f08529b510d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2727", "content": "#TheShadowArmy\n\n#exploit\n1. CVE-2022-28672:\nFoxit PDF Reader - UaF RCE Exploit\nhttps://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n]-&gt; https://github.com/hacksysteam/CVE-2022-28672\n\n2. CVE-2022-45451:\nAcronis Cyber Protect/Home Cyber Protect - Arbitrary File Read\nhttps://github.com/alfarom256/CVE-2022-45451\n\n_-_-_-_-_-_- \u269cJOIN NOW \u269c -_-_-_-_-_-_\n \u274d\u274d\u274d \u2756 @HackingShadow \u2756 \u274d\u274d\u274d", "creation_timestamp": "2022-12-17T17:05:47.000000Z"}, {"uuid": "2cebcaf3-913a-4380-91af-85765c77eb4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1226", "content": "CVE-2022-28672\nFoxit PDF Reader Remote Code Execution Exploit  (NOT POC))))", "creation_timestamp": "2022-12-16T10:42:13.000000Z"}, {"uuid": "d0119d32-9820-43e5-9a9a-cd1cbfc3d2c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/Xs0WHPqLdvErBXPqkYpIPVYNhemixyB31Clv8q-NYWoTMFk", "content": "", "creation_timestamp": "2024-04-24T02:47:33.000000Z"}, {"uuid": "59e48a2c-b970-4c3b-a56b-a42000f2ece1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/hydramarketrebuild/1400", "content": "\u2b50 Foxit PDF Reader UAF RCE Exploit JIT Spraying(CVE-2022-28672)\n\nDownload: https://hydramarket.org/Threads-foxit-pdf-reader-uaf-rce-exploit-jit-spraying-cve-2022-28672", "creation_timestamp": "2024-03-08T02:28:24.000000Z"}, {"uuid": "bd431726-5a68-44f1-9ae4-939714f3c78d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/163571", "content": "{\n  \"Source\": \"documentors\",\n  \"Content\": \"CVE-2022-28672.zip 16.3 kB \ud83d\udd25\ud83d\udd25\ud83d\udd25Foxit PDF Reader UAF RCE Exploit JIT Spraying(CVE-2022-28672) - blog post. This research shows that if Foxit Reader had been compiled with CFG support, the discovered bug would have been more difficult to exploit. However, the lack of CFG support allowed the attacker to use JIT spraying to bypass existing mitigations such as ASLR and DEP. This highlights the importance of using multiple layers of defense to protect against attacks. \ud83d\udca5PoC Exploit \ud83d\udcfaDemo: Foxit PDF Reader RCE Demo - CVE-2022-28672\", \n  \"author\": \"\u2693\ufe0f\ud835\udd07\ud835\udd2c\ud835\udd20\ud835\udd32\ud835\udd2a\ud835\udd22\ud835\udd2b\ud835\udd31\ud835\udd2c\ud835\udd2f\",\n  \"Detection Date\": \"16 Dec 2022\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2022-12-16T20:33:01.000000Z"}, {"uuid": "737d6dd0-e245-4cb0-9db5-101348d0b9d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/-jx7EHctTmYqTI8koTh8D73laqqjIInb8cDob5x2cMEZKPM", "content": "", "creation_timestamp": "2023-11-16T09:43:18.000000Z"}, {"uuid": "46e72f4a-860e-48c5-8146-7b1f4d6814d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/cOoMTAr3uu-H5HEaN88BI6YcCrjCEItfKKSWQ6CUuB745WU", "content": "", "creation_timestamp": "2023-01-04T17:18:05.000000Z"}, {"uuid": "a1b5dc0d-d6c4-4b88-ba32-cfa6e5ae764b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/y8HibvWVTN-yzbX1CVu5oXpNHq21srZvY6f8x63vr328WS8", "content": "", "creation_timestamp": "2022-12-16T13:33:46.000000Z"}, {"uuid": "3617c491-ba30-4528-a284-45814c21a6e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/kgeivNuCy3vXcBLTdzpd7_evC__bk8dJmRoVtIRQlJZYNr8", "content": "", "creation_timestamp": "2023-11-16T09:43:18.000000Z"}, {"uuid": "7689318c-958c-4d49-8192-12895a39900a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/2cgcYrEKl8iyliGtEgF5ibZOlVECU3D5MkRxK-fBYIu2U84", "content": "", "creation_timestamp": "2022-12-16T13:32:32.000000Z"}, {"uuid": "c9c927a6-8e62-45a9-bb18-8e6cea0b9226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "Telegram/h1bJRWLW3_u3sQHOjb9Rj2w1R-18ZAdzum69Qad8nmgHoaA", "content": "", "creation_timestamp": "2022-12-16T13:31:14.000000Z"}, {"uuid": "fc8453e3-feb0-44bd-839f-11059b25db5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1830", "content": "#exploit\n1. CVE-2022-28672:\nFoxit PDF Reader - UaF RCE Exploit\nhttps://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n]-&gt; https://github.com/hacksysteam/CVE-2022-28672\n\n2. CVE-2022-45451:\nAcronis Cyber Protect/Home Cyber Protect - Arbitrary File Read\nhttps://github.com/alfarom256/CVE-2022-45451", "creation_timestamp": "2022-12-17T06:17:07.000000Z"}, {"uuid": "7c640a66-999d-440c-b5b3-6b27915319e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/633", "content": "CVE-2022-28672 : Foxit PDF Reader 11.2.1.53537 - Use after Free / Remote Code Execution \n\nhttps://github.com/hacksysteam/CVE-2022-28672\n\nhttps://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28672", "creation_timestamp": "2022-12-20T21:29:01.000000Z"}, {"uuid": "a84402f8-3fb4-4b55-8ff8-8299e0f760e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/codebreaker01/5173", "content": "", "creation_timestamp": "2023-03-10T20:16:06.000000Z"}, {"uuid": "6fe95f58-baea-458b-bec9-81d8f4e6c137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/database_leak/27421", "content": "\u2b50 Foxit PDF Reader UAF RCE Exploit JIT Spraying(CVE-2022-28672)\n\nDownload: https://hydramarket.co/Threads-foxit-pdf-reader-uaf-rce-exploit-jit-spraying-cve-2022-28672", "creation_timestamp": "2023-02-14T21:12:08.000000Z"}, {"uuid": "256fdfe0-984e-473b-8898-710533f3e7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1806", "content": "\ud83d\udd25\ud83d\udd25\ud83d\udd25Foxit PDF Reader UAF RCE Exploit JIT Spraying(CVE-2022-28672) - blog post.\n\nThis research shows that if Foxit Reader had been compiled with CFG support, the discovered bug would have been more difficult to exploit. However, the lack of CFG support allowed the attacker to use JIT spraying to bypass existing mitigations such as ASLR and DEP. This highlights the importance of using multiple layers of defense to protect against attacks.\n\n\ud83d\udca5PoC Exploit\n\n\ud83d\udcfaDemo: Foxit PDF Reader RCE Demo - CVE-2022-28672", "creation_timestamp": "2022-12-16T14:45:14.000000Z"}, {"uuid": "e0ac5030-0a64-4457-a2b8-c531055b6a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6814", "content": "Foxit PDF Reader - Use after Free - Remote Code Execution Exploit\n\nhttps://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672", "creation_timestamp": "2022-12-16T15:28:43.000000Z"}, {"uuid": "07cdf8d6-d276-4f78-a8e6-08814b5423af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7371", "content": "#exploit\n1. CVE-2022-28672:\nFoxit PDF Reader - UaF RCE Exploit\nhttps://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n]-&gt; https://github.com/hacksysteam/CVE-2022-28672\n\n2. CVE-2022-45451:\nAcronis Cyber Protect/Home Cyber Protect - Arbitrary File Read\nhttps://github.com/alfarom256/CVE-2022-45451", "creation_timestamp": "2022-12-17T13:00:23.000000Z"}, {"uuid": "a37e90e3-abab-467a-b916-f1ad6357c0f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-28672", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/4418", "content": "CVE-2022-28672 ( Foxit PDF Reader Remote Code Execution Exploit )\n\n#exploit #CVE\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:39.000000Z"}]}