{"vulnerability": "CVE-2022-2996", "sightings": [{"uuid": "45c672a1-55f8-4324-b9d3-796dc22e0c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2894", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang\nURL\uff1ahttps://github.com/jprx/CVE-2022-29968\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-09T22:53:26.000000Z"}, {"uuid": "146c0c79-1c8f-4b9f-be12-42ef76eb8953", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29960", "type": "seen", "source": "https://t.me/cibsecurity/47038", "content": "\u203c CVE-2022-29960 \u203c\n\nEmerson OpenBSI through 2022-04-29 uses weak cryptography. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. DES with hardcoded cryptographic keys is used for protection of certain system credentials, engineering files, and sensitive utilities.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T02:41:28.000000Z"}, {"uuid": "1e45cd27-bc3a-4486-b805-bcfc5c069f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "seen", "source": "Telegram/Uieng4hhAZFXjH9lPmah2RHnRpBbF9ZOA1GgoU9giQZ2kg", "content": "", "creation_timestamp": "2022-08-18T15:56:07.000000Z"}, {"uuid": "88e7325f-5002-4e64-b0b3-bd08c9dc0b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "seen", "source": "https://t.me/crackcodes/1040", "content": "Updates On Hackbyte Forum:-\n\n1. Universidad IEU Mexico Leak Files\n2. SCS-Siberia \u201c\u0421\u041a\u0421-\u0421\u0438\u0431\u0438\u0440\u044c\u201d \u2013 Telecommunications Company Russia Leak\n3. D.RDynamicShellcode\n4. DashOverride\n5. CVE-2022-33980 - Apache Commons RCE can use url,dns,script key-words to connect any server\n6. lfimap - Local file inclusion discovery and exploitation tool\n7. MSMAP - Msmap is a Memory WebShell Generator\n8. CVE-2022-29968\n9. CVE-2022-21894 - Secure Boot Security Feature Bypass Vulnerability\n10. PowerHuntShares\n11. chrome_password Js script - Steal Get username &amp; password from Chrome. (Now Only Windows)\n12. Fatebot - Fate is IRC botnet\n13. JNDI-Injection-Exploit-Plus\n14. CVE-2022-27255 - Realtek eCos SDK SIP ALG buffer overflow\n15. Bypass-Sandbox-Evasion\n16. blackhat-arsenal-tools\n17. Blackhat 2022 recap \u2013 cloud, eBPF, global conflicts, supply chain, and more\n18. Hacking Zyxel IP cameras to gain a root shell\n19. CobaltStrike4.5\n20. DUOCELL Leak\n21. KisasaCredit Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-18T15:53:26.000000Z"}, {"uuid": "9844e2f4-c9d6-420b-abf2-ada0f778681f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2996", "type": "seen", "source": "https://t.me/cibsecurity/49184", "content": "\u203c CVE-2022-2996 \u203c\n\nA flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-01T22:38:28.000000Z"}, {"uuid": "14c6ecb2-aace-4cd7-9a40-4ed90c6d2f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29964", "type": "seen", "source": "https://t.me/cibsecurity/47034", "content": "\u203c CVE-2022-29964 \u203c\n\nThe Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. WIOC SSH provides access to a shell as root, DeltaV, or backup via hardcoded credentials. NOTE: this is different from CVE-2014-2350.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T02:41:24.000000Z"}, {"uuid": "69ec0100-bc46-46a4-8d1f-e99a5bc5fb99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "seen", "source": "https://t.me/cibsecurity/41704", "content": "\u203c CVE-2022-29968 \u203c\n\nAn issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-&gt;private.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-02T07:27:25.000000Z"}, {"uuid": "966af919-530c-4e6d-9097-80fca65a66a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29967", "type": "seen", "source": "https://t.me/cibsecurity/41689", "content": "\u203c CVE-2022-29967 \u203c\n\nstatic_compressed_inmemory_website_callback.c in Glewlwyd through 2.6.2 allows directory traversal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-30T02:24:25.000000Z"}, {"uuid": "447b0214-4d82-45e0-a625-ad9aac8ac906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6573", "content": "#exploit\n1. CVE-2022-29968:\nLinux Kernel io_uring Exploit\nhttps://github.com/jprx/CVE-2022-29968\n\n2. CVE-2022-21894:\nSecure Boot Security Feature Bypass Vulnerability (baton drop)\nhttps://github.com/Wack0/CVE-2022-21894", "creation_timestamp": "2024-11-01T20:41:46.000000Z"}, {"uuid": "44f1bad3-08ae-4602-9bbe-de4d66c7754b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29969", "type": "seen", "source": "https://t.me/cibsecurity/41720", "content": "\u203c CVE-2022-29969 \u203c\n\nThe RSS extension before 2022-04-29 for MediaWiki allows XSS via an rss element (if the feed is in $wgRSSUrlWhitelist and $wgRSSAllowLinkTag is true).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-02T17:48:10.000000Z"}]}