{"vulnerability": "CVE-2022-23222", "sightings": [{"uuid": "b7ed6c70-e1bc-4425-9cf2-7caa25d062fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2672", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-23222, managed with Rust.\nURL\uff1ahttps://github.com/RafaelOrtizRC/CVE-2022-23222\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-10T04:17:28.000000Z"}, {"uuid": "6db4d64d-9887-4b6e-a49a-6ad7bfe61a6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/osintflow/389", "content": "https://github.com/tr3ee/CVE-2022-23222\n\u0414\u043b\u044f \u043d\u0430\u0439\u043d\u043e\u0432\u0456\u0448\u0438\u0445  \u044f\u0434\u0435\u0440 \u0432 \u0442\u043e\u043c\u0443 \u0447\u0438\u0441\u043b\u0456 .", "creation_timestamp": "2022-06-19T22:26:38.000000Z"}, {"uuid": "9c96e0f1-18ff-4bd7-b640-e6abf8626bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "seen", "source": "https://t.me/proxy_bar/870", "content": "CVE-2022-23222\nLinux LPE. Kernel  5.8 - 5.16  \u2014- \u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 5.10.92 / 5.15.15 / 5.16.1\nexploit\n*\n#exploit #linux #lpe", "creation_timestamp": "2022-06-13T08:54:35.000000Z"}, {"uuid": "35278281-fc41-4c1b-8ef8-b787bc328354", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "seen", "source": "https://t.me/cibsecurity/35489", "content": "\u203c CVE-2022-23222 \u203c\n\nkernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-14T12:19:07.000000Z"}, {"uuid": "39acfa5e-cada-4e4f-93c2-276158f9b283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6156", "content": "#exploit\nLinux Kernel eBPF LPE\n1. CVE-2021-4204:\nhttps://github.com/tr3ee/CVE-2021-4204\n\n2. CVE-2022-23222:\nhttps://github.com/tr3ee/CVE-2022-23222", "creation_timestamp": "2022-07-01T05:52:30.000000Z"}, {"uuid": "d09b0a05-e763-4ec5-86ac-c09da8d3cb55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6326", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (June 1-30)\n\nCVE-2022-30190 - Follina exploit\nCVE-2022-26134 - OGNL injection in Atlassian Confluence Server/Data Center\nCVE-2022-26809 - Weakness in a core Windows 7/10/Srv19/22 component (RPC)\nCVE-2022-30075 - TP-Link AX50 Auth RCE\nCVE-2022-23222 - Linux Kernel eBPF LPE\nCVE-2022-32275 - Grafana 8.4.3 allows reading files\nCVE-2022-26937 - Windows NFS NLM Portmap Stack Buffer Overflow\nCVE-2022-23088 - Heap Overflow in FreeBSD Wi-Fi Stack\nCVE-2022-31626 - RCE in PHP &lt;=7.4.29\nCVE-2022-30333 - Dir Traversal in rar", "creation_timestamp": "2024-10-12T06:49:41.000000Z"}, {"uuid": "b7e50e0f-8a08-4163-8ef5-b98f45ac966d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/club31337/1120", "content": "https://github.com/tr3ee/CVE-2022-23222", "creation_timestamp": "2024-11-09T03:51:30.000000Z"}, {"uuid": "ecd436f1-3ff7-4208-bbe5-43709cee1a07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2691", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-23222, managed with Rust.\nURL\uff1ahttps://github.com/FridayOrtiz/CVE-2022-23222\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-12T21:39:40.000000Z"}, {"uuid": "40a08d42-2c7e-4bab-9e4d-f54b9d88f884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/osintflow_team/346", "content": "https://github.com/tr3ee/CVE-2022-23222\n\u0414\u043b\u044f \u043d\u0430\u0439\u043d\u043e\u0432\u0456\u0448\u0438\u0445  \u044f\u0434\u0435\u0440 \u0432 \u0442\u043e\u043c\u0443 \u0447\u0438\u0441\u043b\u0456 .", "creation_timestamp": "2023-06-12T21:41:38.000000Z"}, {"uuid": "0aaf2dff-87fc-4e97-84bd-816b69c15b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/poxek/2091", "content": "CVE-2022-23222 Exploit Linux Kernel eBPF LPE\nhttps://github.com/tr3ee/CVE-2022-23222\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-07-25T11:01:16.000000Z"}, {"uuid": "af54a7dc-b414-46ae-9e05-06eb54ce1e74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "seen", "source": "https://t.me/linkersec/170", "content": "Two eBPF exploits\n\nExploits for two bugs in the eBPF code, CVE-2021-4204 and CVE-2022-23222, by tr3e with brief write-ups in Chinese.", "creation_timestamp": "2022-06-30T11:13:53.000000Z"}, {"uuid": "3e91de8a-826e-4cc5-9b62-7eedee8ece2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "Telegram/RW-6RB41TnNFnUMt8TW9G5AuRK24-DSqb5M8ohmJxNKqPA", "content": "", "creation_timestamp": "2022-06-13T10:14:03.000000Z"}, {"uuid": "8970a294-7889-46c0-84be-c622e91958bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/RESOLUTEATTACK/462", "content": "\ud83d\ude08CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation\n\nhttps://github.com/tr3ee/CVE-2022-23222\n\nTadn3wb | EAGER7\n\n#\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438  #CVE", "creation_timestamp": "2023-01-05T21:56:24.000000Z"}, {"uuid": "db4bb377-17be-4f0b-91c6-9673c4236468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/210", "content": "CVE-2022-23222 : Linux Kernel 5.15.14 eBPF Local Privilege Escalation\nhttps://github.com/tr3ee/CVE-2022-23222", "creation_timestamp": "2022-06-08T21:05:08.000000Z"}, {"uuid": "39dc779f-245a-4ee4-b22e-4a8b5af1e288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23222", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2140", "content": "#exploit\n\nCVE-2022-23222:\nLinux Kernel eBPF LPE\n\nhttps://github.com/tr3ee/CVE-2022-23222\n\n@BlueRedTeam", "creation_timestamp": "2022-06-09T13:35:54.000000Z"}]}