{"vulnerability": "CVE-2022-29968", "sightings": [{"uuid": "1e45cd27-bc3a-4486-b805-bcfc5c069f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "seen", "source": "Telegram/Uieng4hhAZFXjH9lPmah2RHnRpBbF9ZOA1GgoU9giQZ2kg", "content": "", "creation_timestamp": "2022-08-18T15:56:07.000000Z"}, {"uuid": "45c672a1-55f8-4324-b9d3-796dc22e0c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2894", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang\nURL\uff1ahttps://github.com/jprx/CVE-2022-29968\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-09T22:53:26.000000Z"}, {"uuid": "69ec0100-bc46-46a4-8d1f-e99a5bc5fb99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "seen", "source": "https://t.me/cibsecurity/41704", "content": "\u203c CVE-2022-29968 \u203c\n\nAn issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-&gt;private.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-02T07:27:25.000000Z"}, {"uuid": "88e7325f-5002-4e64-b0b3-bd08c9dc0b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "seen", "source": "https://t.me/crackcodes/1040", "content": "Updates On Hackbyte Forum:-\n\n1. Universidad IEU Mexico Leak Files\n2. SCS-Siberia \u201c\u0421\u041a\u0421-\u0421\u0438\u0431\u0438\u0440\u044c\u201d \u2013 Telecommunications Company Russia Leak\n3. D.RDynamicShellcode\n4. DashOverride\n5. CVE-2022-33980 - Apache Commons RCE can use url,dns,script key-words to connect any server\n6. lfimap - Local file inclusion discovery and exploitation tool\n7. MSMAP - Msmap is a Memory WebShell Generator\n8. CVE-2022-29968\n9. CVE-2022-21894 - Secure Boot Security Feature Bypass Vulnerability\n10. PowerHuntShares\n11. chrome_password Js script - Steal Get username &amp; password from Chrome. (Now Only Windows)\n12. Fatebot - Fate is IRC botnet\n13. JNDI-Injection-Exploit-Plus\n14. CVE-2022-27255 - Realtek eCos SDK SIP ALG buffer overflow\n15. Bypass-Sandbox-Evasion\n16. blackhat-arsenal-tools\n17. Blackhat 2022 recap \u2013 cloud, eBPF, global conflicts, supply chain, and more\n18. Hacking Zyxel IP cameras to gain a root shell\n19. CobaltStrike4.5\n20. DUOCELL Leak\n21. KisasaCredit Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-18T15:53:26.000000Z"}, {"uuid": "447b0214-4d82-45e0-a625-ad9aac8ac906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29968", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6573", "content": "#exploit\n1. CVE-2022-29968:\nLinux Kernel io_uring Exploit\nhttps://github.com/jprx/CVE-2022-29968\n\n2. CVE-2022-21894:\nSecure Boot Security Feature Bypass Vulnerability (baton drop)\nhttps://github.com/Wack0/CVE-2022-21894", "creation_timestamp": "2024-11-01T20:41:46.000000Z"}]}