{"vulnerability": "CVE-2022-29885", "sightings": [{"uuid": "ec4d64c1-cde1-421c-be0d-fd4aa2c21074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2615", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aApache Tomcat DoS (CVE-2022-29885) Exploit\nURL\uff1ahttps://github.com/iveresk/CVE-2022-29885\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-01T09:07:26.000000Z"}, {"uuid": "fd59c854-8178-49ea-b9c3-f778c5cf9cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2609", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aApache Tomcat DoS (CVE-2022-29885) Exploit \nURL\uff1ahttps://github.com/4ra1n/CVE-2022-29885\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-02T04:12:23.000000Z"}, {"uuid": "75df853b-2761-4204-a332-13ce491102c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/reconshell/1314", "content": "CVE-2022-29885 Apache Tomcat DoS\n\n#Hacking #Bugbounty #Exploit #Malware #CyberSecurity\n#CVE-2022-29885 #Apache #Tomcat #DoS #Pentest #VAPT\n\nhttps://reconshell.com/cve-2022-29885-apache-tomcat-dos/", "creation_timestamp": "2022-07-03T08:20:13.000000Z"}, {"uuid": "3a0e8356-a0c9-47d7-84b6-f9aebc6e159b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "Telegram/-h5elRfZctG-aUd3dw0eY53VHCzOGJCXi3zvJY_7v4zbQw", "content": "", "creation_timestamp": "2022-06-30T21:34:58.000000Z"}, {"uuid": "8c3ad2ac-ac13-417b-8e30-b61373f19283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "seen", "source": "Telegram/tvagmoXGD-sjRG5teDO-DfPH2_iB-IEEjYRnLqN5-gAxoA", "content": "", "creation_timestamp": "2022-07-15T08:17:26.000000Z"}, {"uuid": "8b001f80-5105-4178-8b9e-cc1e616918d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "seen", "source": "https://t.me/crackcodes/838", "content": "Updates On Hackbyte Forum:-\n\n\ud83d\udcccRetbleed: Arbitrary Speculative Code Execution with Return Instructions\n\ud83d\udcccExecuting Arbitrary Code Over a Phone Line Thanks to the XBAND Video Game Modem\n\ud83d\udcccRolling PWN Attack Affecting Honda Vehicles\n\ud83d\udcccCVE-2022-32223 Discovery: DLL Hijacking via npm CLI\n\ud83d\udcccFrom Prototype Pollution to Remote Code Execution in Blitz.js\n\ud83d\udcccAttacking Active Directory: 0 to 0.9\n\ud83d\udcccCVE-2022-29885 \u2013 Apache Tomcat Cluster Service DoS\n\ud83d\udcccCVE-2022-29593\n\ud83d\udcccNorth South University / Bangladesh / email login\n\ud83d\udcccdeeppaste Leak\n\ud83d\udcccLivejournalfull Leak\n\ud83d\udcccGemotest Crm Leak\n\ud83d\udcccSplunk Attack\n\ud83d\udcccNzyme - WiFi Defense System\n\ud83d\udcccProject-Whis - Advanced HTTP Botnet\n\ud83d\udcccCode Signing Certificate Cloning Attack\n\ud83d\udcccRetbleed - Arbitrary Speculative Code Execution with Return Instruction.\n\ud83d\udcccConfluence Pre-Auth RCE.\n\ud83d\udcccmicrosoft-rpc-fuzzing-tools\n\ud83d\udcccCVE-2022-26135\n\ud83d\udcccXSS Payload List\n\ud83d\udcccheaders for hackers | PHP #ssrf | #cve-2020-7066 Video\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffb Updates:- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-07-16T09:11:59.000000Z"}, {"uuid": "bf95622a-c1e1-4d6d-97f0-a045a412e2f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29885", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6139", "content": "#exploit\n1. Tomcat CVE-2022-29885\nhttps://4ra1n.love/post/5zNrXSlvJ\n2. CVE-2021-25076:\nWordpress Plugin WP User Frontend &lt; 3.5.26 - SQL-Injection\nhttps://github.com/0xAbbarhSF/CVE-2021-25076\n3. CVE-2020-29607:\nPluck CMS 4.7.13 - File Upload RCE\nhttps://github.com/0xAbbarhSF/CVE-2020-29607", "creation_timestamp": "2022-06-05T13:17:01.000000Z"}]}