{"vulnerability": "CVE-2022-2962", "sightings": [{"uuid": "d911a7c5-9a32-41ca-acb6-9f3dd2e5d176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29623", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16952", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-29623\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An arbitrary file upload vulnerability in the file upload module of Express Connect-Multiparty 2.2.0 allows attackers to execute arbitrary code via a crafted PDF file. NOTE: the Supplier has not verified this vulnerability report.\n\ud83d\udccf Published: 2022-05-16T13:28:41.000Z\n\ud83d\udccf Modified: 2025-05-20T06:09:26.360Z\n\ud83d\udd17 References:\n1. https://www.youtube.com/watch?v=i3xJR-91rrM\n2. https://github.com/expressjs/connect-multiparty/releases/tag/2.2.0\n3. https://www.npmjs.com/package/connect-multiparty", "creation_timestamp": "2025-05-20T06:39:42.000000Z"}, {"uuid": "1f4ba3c5-bb59-4ca9-a22e-b57b0e4f2f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29622", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2442", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aChallenge for you all to prove that CVE-2022\u201329622 is not false\nURL\uff1ahttps://github.com/keymandll/CVE-2022-29622\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-06-06T13:06:58.000000Z"}, {"uuid": "69ae183e-2e7b-426e-8a64-03cc9334a495", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29620", "type": "seen", "source": "https://t.me/cibsecurity/43978", "content": "\u203c CVE-2022-29620 \u203c\n\n** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-08T00:31:19.000000Z"}, {"uuid": "ec61e1de-5b49-4888-b7a5-c2bcd4433e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29622", "type": "seen", "source": "https://t.me/arpsyndicate/4766", "content": "#ExploitObserverAlert\n\nCVE-2022-29622\n\nDESCRIPTION: Exploit Observer has 19 entries in 5 file formats related to CVE-2022-29622. An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled.\n\nFIRST-EPSS: 0.004440000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-PRIORITY: 0.7061381", "creation_timestamp": "2024-04-23T19:14:34.000000Z"}, {"uuid": "ea9755ce-9e33-4c92-bdfb-470a107a8b4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2962", "type": "seen", "source": "https://t.me/cibsecurity/49720", "content": "\u203c CVE-2022-2962 \u203c\n\nA DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-14T00:25:42.000000Z"}, {"uuid": "66fe2709-5e81-4d2f-8a3f-6ddb04b9ba8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29623", "type": "seen", "source": "https://t.me/cibsecurity/42733", "content": "\u203c CVE-2022-29623 \u203c\n\nAn arbitrary file upload vulnerability in the file upload module of Connect-Multiparty v2.2.0 allows attackers to execute arbitrary code via a crafted PDF file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-16T18:26:25.000000Z"}, {"uuid": "ac858bb4-b2b8-48fa-a564-ec7bca88bb61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29622", "type": "seen", "source": "https://t.me/cibsecurity/42743", "content": "\u203c CVE-2022-29622 \u203c\n\nAn arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-16T18:26:36.000000Z"}]}