{"vulnerability": "CVE-2022-3059", "sightings": [{"uuid": "1871a08a-011c-4547-8199-f8d2630c487a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-30594", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0287/", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "92447b95-1a03-4abf-9170-4f88e581c23d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30592", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2955", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aHTTP3-attacks (CVE-2022-30592)\nURL\uff1ahttps://github.com/efchatz/HTTP3-attacks\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-16T09:06:17.000000Z"}, {"uuid": "fc406254-a0c7-4d69-a112-06ff2f12e7b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30592", "type": "seen", "source": "https://t.me/poxek/2323", "content": "CVE-2022-30592\n\nliblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.", "creation_timestamp": "2022-08-21T07:00:04.000000Z"}, {"uuid": "babcacdf-ddab-4190-8199-136dd0c730d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30592", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/486", "content": "CVE-2022-30592 : HTTP3 - Attacks\nhttps://github.com/efchatz/HTTP3-attacks", "creation_timestamp": "2022-09-28T22:29:01.000000Z"}, {"uuid": "8fad0586-3934-44ac-b3af-8859224c7e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30591", "type": "seen", "source": "https://t.me/cibsecurity/45649", "content": "\u203c CVE-2022-30591 \u203c\n\n** DISPUTED ** quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-06T16:20:58.000000Z"}, {"uuid": "779b4b00-314e-47b5-b21d-d08e62e09d75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30595", "type": "seen", "source": "https://t.me/cibsecurity/43324", "content": "\u203c CVE-2022-30595 \u203c\n\nlibImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-25T16:38:09.000000Z"}, {"uuid": "b98fcb41-1eb4-4b6d-8ab5-673b71d5492c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30597", "type": "seen", "source": "https://t.me/cibsecurity/42948", "content": "\u203c CVE-2022-30597 \u203c\n\nA flaw was found in moodle where the description user field was not hidden when being set as a hidden user field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-18T22:28:41.000000Z"}, {"uuid": "84b79113-ce59-4574-b2c6-8debaeb6bcbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30599", "type": "seen", "source": "https://t.me/cibsecurity/42951", "content": "\u203c CVE-2022-30599 \u203c\n\nA flaw was found in moodle where an SQL injection risk was identified in Badges code relating to configuring criteria.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-18T22:28:44.000000Z"}, {"uuid": "2afa8312-a059-4150-87b8-f5e093c8e31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30598", "type": "seen", "source": "https://t.me/cibsecurity/42950", "content": "\u203c CVE-2022-30598 \u203c\n\nA flaw was found in moodle where global search results could include author information on some activities where a user may not otherwise have access to it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-18T22:28:42.000000Z"}, {"uuid": "366d63aa-3333-4830-91fa-08328703c9f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30592", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2311", "content": "#CVE-2022\n\nHTTP3-attacks (CVE-2022-30592)\n\nhttps://github.com/efchatz/HTTP3-attacks\n\n@BlueRedTeam", "creation_timestamp": "2022-08-16T19:27:58.000000Z"}, {"uuid": "0542f459-4a65-4fef-a94f-cc91be4bbbab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30594", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6033", "content": "#exploit\n1. Writing a simple rootkit for linux\nhttps://0x00sec.org/t/writing-a-simple-rootkit-for-linux/29034\n\n2. CVE-2022-30594:\nLinux - two seccomp bugs: PT_SUSPEND_SECCOM permission bypass, ptracer death race\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2276", "creation_timestamp": "2022-05-19T11:01:01.000000Z"}, {"uuid": "75a60827-a38d-45ab-a770-b2b0d7cf5ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30592", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6729", "content": "#Red_Team_Tactics\n1. Shellcode Injection Techniques in C#\nhttps://crypt0ace.github.io/posts/Shellcode-Injection-Techniques\n2. HTTP3-attacks (CVE-2022-30592)\nhttps://github.com/efchatz/HTTP3-attacks", "creation_timestamp": "2022-09-03T13:48:00.000000Z"}]}