{"vulnerability": "CVE-2022-2639", "sightings": [{"uuid": "cacf4313-b120-4036-8a91-479cff7fb997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/premiumAIG/242", "content": "CVE-2022-2639: Linux kernel openvswitch local privilege escalation.", "creation_timestamp": "2022-09-15T01:49:52.000000Z"}, {"uuid": "66edda10-b4ec-4b7c-b85b-5424e2b60396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "https://t.me/leakfb/905", "content": "\ud83d\udc31 Including thousands of data leaks, hacking programs, cracked accounts and much more; Don't forget to join \n\n\ud83d\udd35www.clubhydra.co \ud83d\udd34\n\n\u26d4 New:\n\n\ud83d\udfe1Review: CVE-2022-2639: Linux kernel openvswitch local privilege escalation\n\ud83d\udfe1Review: INDIA'S VARIOUS CITY LEADS\n\ud83d\udfe1Review: ISO payload article and supporting files\n\ud83d\udfe1Review: acis.eoir.justice.gov full data\n\ud83d\udfe1Review: Digital Threats (RESEARCH &amp; PRACTICE - 2021\n\ud83d\udfe1Review: Huawei equipment\n\ud83d\udfe1Review: PS5 4.03 Kernel Exploit\n\ud83d\udfe1Review: US military contractor files and Puerto Rican files\n\ud83d\udfe1Review: kinokassa.ru-orders full\n\ud83d\udfe1Review: bazi.guru Leak Data\n\ud83d\udfe1Review: italonceramica.ru Data Leak\n\ud83d\udfe1Review: Youthmanual.com Leak\n\ud83d\udfe1Review: CHATBOTS-BUILDER.COM Database\n\ud83d\udfe1Review: Entrust.com Data Leak\n\ud83d\udfe1Review: msp.gov.ua SQL Leak\n\ud83d\udfe1Review: Badoo.com Leak Data\n\ud83d\udfe1Review: intimshop.ru Data Leak\n\ud83d\udfe1Review: alpmarathon.ru data leaked\n\ud83d\udfe1Review: Zenler.com Leak Data\n\ud83d\udfe1Review: USA Doctors Database 1M\n\ud83d\udfe1Review: Russian public services database leaked part 2\n\ud83d\udfe1Review: US redawning.com 170k User\n\ud83d\udfe1Review: Avito.ru Leak Data\n\ud83d\udfe1Review: ahcollege.gov.bd Leak Data\n\ud83d\udfe1Review: bookmate.com Leak Data\n\ud83d\udfe1Review: Resident database Russia full\n\ud83d\udfe1Review: kisch.co.il Leak Data\n\ud83d\udfe1Review: 150 UK gamblers database\n\ud83d\udfe1Review: Bangladesh Navy database\n\n\ud83d\ude35\u200d\ud83d\udcab VIP Area Price:\n\n\ud83d\udfe11 Month: $ 50\n\ud83d\udfe1Lifetime: $ 250\n\n\ud83d\udd25Support: @clubHydra\u2708\ufe0f", "creation_timestamp": "2022-10-18T15:26:23.000000Z"}, {"uuid": "db60222d-8dcd-4538-9d3e-9edf83ab4363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/atlantiscyberarmy/7945", "content": "CVE-2022-2639: Linux kernel openvswitch local privilege escalation.", "creation_timestamp": "2022-09-15T01:46:18.000000Z"}, {"uuid": "b01b50b9-9897-4a3a-ac4d-7f97cb9b5a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2816", "content": "#Tools -\u00a0 \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\nToRat\n\nA Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients.\n\nhttps://github.com/lu4p/ToRat\n\n\u200b\u200bSim-Ba\n\nSim-Ba is an in-memory PE Loader designed to simulate the behaviour of Bazar Loader. It downloads the payload from C2 URL (http or https) and uses Process Hollowing method to inject downloaded PE into the new process created in suspended state. \n\nProcess Hollowing is already a well-known and commonly used injection technique by malware developers. Sim-Ba is a modified version of another Process Hollowing repository: idan1288/ProcessHollowing32-64\n\nhttps://github.com/OccamsXor/sim-ba\n\nEvilnoVNC\n\nA Ready to go Phishing Platform.\n\nUnlike other phishing techniques, EvilnoVNC allows 2FA bypassing by using a real browser over a noVNC connection.\n\nIn addition, this tool allows us to see in real time all of the victim's actions, access to their downloaded files and the entire browser profile, including cookies, saved passwords, browsing history and much more.\n\nhttps://github.com/JoelGMSec/EvilnoVNC\n\nResearch:\nhttps://darkbyte.net/robando-sesiones-y-bypasseando-2fa-con-evilnovnc/\n\nSysadmin\n\nSysadmin makes easier to administer multidomain Active Directory-based networks by providing a single tool to do whatever you need - use it to manage domains, servers, computers, users, and groups.\n\nFeatures:\n\u25ab\ufe0f Add, edit and delete objects in Active Directory\n\u25ab\ufe0f View software and hardware\n\u25ab\ufe0f Events, processes, services on computers\n\u25ab\ufe0f Add and delete objects from groups\n\u25ab\ufe0f Reset a user's password\n\u25ab\ufe0f Add photos\n\u25ab\ufe0f Restart and shutdown remote computers\n\u25ab\ufe0f Computers performance\n\u25ab\ufe0f Patterns for add new users\n\u25ab\ufe0f Reports (20+)\n\nhttps://github.com/sysadminanywhere/sysadmin\n\nBLACKHAT_USA2022\n\nJust About BLACKHAT USA2022 PDF Public\n\nhttps://github.com/Mr-xn/BLACKHAT_USA2022\n\nQEMU \n\nA generic and open source machine &amp; userspace emulator and virtualizer.\n\nQEMU is capable of emulating a complete machine in software without any need for hardware virtualization support. By using dynamic translation, it achieves very good performance. QEMU can also integrate with the Xen and KVM hypervisors to provide emulated hardware while allowing the hypervisor to manage the CPU. With hypervisor support, QEMU can achieve near native performance for CPUs. When QEMU emulates CPUs directly it is capable of running operating systems made for one machine (e.g. an ARMv7 board) on a different machine (e.g. an x86_64 PC board).\n\nQEMU is also capable of providing userspace API virtualization for Linux and BSD kernel interfaces. This allows binaries compiled against one architecture ABI (e.g. the Linux PPC64 ABI) to be run on a host using a different architecture ABI (e.g. the Linux x86_64 ABI). This does not involve any hardware emulation, simply CPU and syscall emulation.\n\nhttps://github.com/TrungNguyen1909/qemu-t8030\n\nActiveDirectoryAttackTool\n\nADAT tool is used to assist CTF players and Penetration testers with helpful commands to run against an Active Directory Domain Controller. This tool is best utilized using a set of known working credentials against the host.\n\nhttps://github.com/The-Viper-One/ActiveDirectoryAttackTool\n\nADSearch\n\nA tool written for cobalt-strike's execute-assembly command that allows for more efficent querying of AD.\n\nKey Features:\n\u25ab\ufe0f List all Domain Admins\n\u25ab\ufe0f Custom LDAP Search\n\u25ab\ufe0f Connect to LDAPS Servers\n\u25ab\ufe0f Output JSON data from AD instances\n\u25ab\ufe0f Retrieve custom attributes from a generic query (i.e. All computers)\n\nhttps://github.com/tomcarver16/ADSearch\n\nCVE-2022-2639\n\nLinux kernel openvswitch local privilege escalation.\n\nhttps://github.com/veritas501/CVE-2022-2639-PipeVersion\n\nJoin:\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory\n\nWebsite:\nwww.ghostclan.org\n\n#InsoSec #cybersec \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06", "creation_timestamp": "2023-04-01T08:24:08.000000Z"}, {"uuid": "edb37f86-0cea-4395-8ee9-667a8d64c2f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2840", "content": "Tools\u00a0 \ud83d\udee0\ufe0f \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n\u200b\u200bCVE-2022-2639\n\nLinux kernel openvswitch local privilege escalation.\n\nhttps://github.com/veritas501/CVE-2022-2639-PipeVersion\n\n#exploit #linux\n\n\u200b\u200bConnect\n\nCommand and Control Framework\n\nConnect is a tool for testing the security posture of internal environments by simulating real world tactics performed by threat actors. It features an extensible command set and server architecture to deploy and maintain agents for multiple languages and platforms. This extensibility provides operators the ability to rapidly conduct and repeat specific scenarios.\n\nConnect is only to be used for legal applications when the explicit permission of the targeted organization has been obtained.\n\nhttps://github.com/skylerknecht/connect\n\n\u200b\u200bColorDataProxyUACBypass\n\nExploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass. Win 7 &amp; up.\n\nhttps://github.com/hackerhouse-opensource/ColorDataProxyUACBypass\n\n\u200b\u200bPackMyPayload\n\nEmerging Threat of Containerized Malware\n\nThis tool takes a file or directory on input and embeds them into an output file acting as an archive/container. It can serve purpose for a Proof-of-Concept presenting emerging risk of container file formats with embedded malware, as well as helper for professional Red Team Operators to sharpen their Initial Access maneuvers.\n\nCurrently Threat Actors are known to smuggle their malware archived in various container file formats, to name a few:\n\n\u25ab\ufe0f 7zip\n\u25ab\ufe0f zip\n\u25ab\ufe0f ISO\n\u25ab\ufe0f IMG\n\nThey do that to get their payloads pass file content scanners, but more importantly to avoid having Mark-Of-The-Web flag on their files. There're various motives on why adversaries don't want MOTW on their files: Protected View in Microsoft Office was always among them.\n\nShould they provide container file to their victims, a foundation for disabling VBA macros in Internet-originated Office documents might be bypassed.\n\nhttps://github.com/mgeeky/PackMyPayload\n\n\u200b\u200bSubEvil\n\nAn advanced open source intelligence framework (OSINT) for grouping subdomains.\n\nhttps://github.com/Evil-Twins-X/SubEvil\n\n\u200b\u200bCheeseOunce\n\nThis Simple POC make windows machines auth to another via MS-EVEN.\n\nhttps://github.com/evilashz/CheeseOunce\n\n\u200b\u200bNoFaxGiven\n\nA fax routing extension is a DLL that adds routing functionality to the fax service\n\nhttps://github.com/hackerhouse-opensource/NoFaxGiven\n\n\u200b\u200bAura \n\nA static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code published on PyPI.\n\nProject goals:\n\n\u25ab\ufe0f provide an automated monitoring system over uploaded packages to PyPI, alert on anomalies that can either indicate an ongoing attack or vulnerabilities in the code\n\u25ab\ufe0f enable an organization to conduct automated security audits of the source code and implement secure coding practices with a focus on auditing 3rd party code such as python package dependencies\n\u25ab\ufe0f allow researches to scan code repositories on a large scale, create datasets and perform analysis to further advance research in the area of vulnerable and malicious code dependencies\n\nhttps://github.com/SourceCode-AI/aura\n\n\u200b\u200bScoutSuite\n\nScout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, \n\nScout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of the attack surface automatically.\n\n\u25ab\ufe0f https://github.com/nccgroup/ScoutSuite\n\u25ab\ufe0f https://github.com/nccgroup/sadcloud\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory\n\n#Tools\u00a0 \ud83d\udee0\ufe0f \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06", "creation_timestamp": "2024-02-26T04:21:48.000000Z"}, {"uuid": "72a14732-519d-41db-9912-9f58f0779fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "https://t.me/hydramarketrebuild/658", "content": "\ud83d\udc31 Including thousands of data leaks, hacking programs, cracked accounts and much more; Don't forget to join \n\n\ud83d\udd35www.clubhydra.co \ud83d\udd34\n\n\u26d4 New:\n\n\ud83d\udfe1Review: CVE-2022-2639: Linux kernel openvswitch local privilege escalation\n\ud83d\udfe1Review: INDIA'S VARIOUS CITY LEADS\n\ud83d\udfe1Review: ISO payload article and supporting files\n\ud83d\udfe1Review: acis.eoir.justice.gov full data\n\ud83d\udfe1Review: Digital Threats (RESEARCH &amp; PRACTICE - 2021\n\ud83d\udfe1Review: Huawei equipment\n\ud83d\udfe1Review: PS5 4.03 Kernel Exploit\n\ud83d\udfe1Review: US military contractor files and Puerto Rican files\n\ud83d\udfe1Review: kinokassa.ru-orders full\n\ud83d\udfe1Review: bazi.guru Leak Data\n\ud83d\udfe1Review: italonceramica.ru Data Leak\n\ud83d\udfe1Review: Youthmanual.com Leak\n\ud83d\udfe1Review: CHATBOTS-BUILDER.COM Database\n\ud83d\udfe1Review: Entrust.com Data Leak\n\ud83d\udfe1Review: msp.gov.ua SQL Leak\n\ud83d\udfe1Review: Badoo.com Leak Data\n\ud83d\udfe1Review: intimshop.ru Data Leak\n\ud83d\udfe1Review: alpmarathon.ru data leaked\n\ud83d\udfe1Review: Zenler.com Leak Data\n\ud83d\udfe1Review: USA Doctors Database 1M\n\ud83d\udfe1Review: Russian public services database leaked part 2\n\ud83d\udfe1Review: US redawning.com 170k User\n\ud83d\udfe1Review: Avito.ru Leak Data\n\ud83d\udfe1Review: ahcollege.gov.bd Leak Data\n\ud83d\udfe1Review: bookmate.com Leak Data\n\ud83d\udfe1Review: Resident database Russia full\n\ud83d\udfe1Review: kisch.co.il Leak Data\n\ud83d\udfe1Review: 150 UK gamblers database\n\ud83d\udfe1Review: Bangladesh Navy database\n\n\ud83d\ude35\u200d\ud83d\udcab VIP Area Price:\n\n\ud83d\udfe11 Month: $ 50\n\ud83d\udfe1Lifetime: $ 250\n\n\ud83d\udd25Support: @clubHydra\u2708\ufe0f", "creation_timestamp": "2022-10-18T22:07:22.000000Z"}, {"uuid": "b8cd42d4-617e-45de-8739-23557862a9aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/950", "content": "CVE-2022-2639\nLinux kernel openvswitch local privilege escalation\nexploit - download\n\ud83c\udf83\ud83c\udf83\ud83c\udf83\n#exploit #linux", "creation_timestamp": "2022-09-06T08:37:12.000000Z"}, {"uuid": "5cfd81ee-73d7-40b6-8074-91040c5ef541", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1427", "content": "kernel-linux-factory\n*\n\u0423\u0434\u043e\u0431\u043d\u043e \u0442\u0435\u043c, \u0447\u0442\u043e \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043b\u0438 \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0442\u044c \u0441\u0440\u0435\u0434\u0443, \u0433\u043b\u044f\u043d\u0443\u043b \u043a\u0430\u043a\u043e\u0435 \u044f\u0434\u0440\u043e, \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b \u0441\u043f\u043b\u043e\u0435\u0442, \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u043f\u043e \u043c\u043e\u0440\u0434\u0435 #root\n*\n\u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 exploits \u0434\u043b\u044f:\nCVE-2016-9793\n4-20-BPF-integer\nCVE-2017-5123\nCVE-2017-6074\nCVE-2017-7308\nCVE-2017-8890\nCVE-2017-11176\nCVE-2017-16995\nCVE-2017-1000112\nCVE-2018-5333\nCVE-2019-9213 &amp; CVE-2019-8956\nCVE-2019-15666\nCVE-2020-8835\nCVE-2020-27194\nCVE-2021-3156\nCVE-2021-31440\nCVE-2021-3490\nCVE-2021-22555\nCVE-2021-41073\nCVE-2021-4154\nCVE-2021-42008\nCVE-2021-43267\nCVE-2022-0185\nCVE-2022-0847\nCVE-2022-0995\nCVE-2022-1015\nCVE-2022-2588\nCVE-2022-2639\nCVE-2022-25636\nCVE-2022-27666\nCVE-2022-32250\nCVE-2022-34918\n\ndownload\n\n#linux #exploits #kernel", "creation_timestamp": "2023-03-23T06:30:43.000000Z"}, {"uuid": "5276d20d-094f-432f-b542-f2fabc7078b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "Telegram/ZiF_F4FaZMu7t_fJNNIx4rjU5F7Qb1TxxctA5NxBJ6PmU74", "content": "", "creation_timestamp": "2022-09-16T08:45:14.000000Z"}, {"uuid": "112a0480-da8a-4675-b601-d082edfeca89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "Telegram/6sW7AdV7v135iCytM01Cj-LTPyNcHAIny6siInZ07HzEgqw", "content": "", "creation_timestamp": "2022-09-11T10:35:15.000000Z"}, {"uuid": "e0e84ec4-ea83-4af8-82ba-b679e34a60cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "Telegram/v6JkxbGhmVil-iIS-4ic-gybf5bO2pce6dC5aTKyEdqntgI", "content": "", "creation_timestamp": "2022-09-13T15:22:04.000000Z"}, {"uuid": "1346c96f-8170-461a-83e2-d1a712a9e9ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "Telegram/LG5-Kz7izukU5c4Xf3O8_KdeN1mZiqjGWcXdpk40oPWuFtg", "content": "", "creation_timestamp": "2022-09-13T17:06:25.000000Z"}, {"uuid": "5a7be392-a116-4725-a0a3-45a1701e226b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "https://t.me/database_leak/26055", "content": "\ud83d\udc31 Including thousands of data leaks, hacking programs, cracked accounts and much more; Don't forget to join \n\n\ud83d\udd35www.clubhydra.co \ud83d\udd34\n\n\u26d4 New:\n\n\ud83d\udfe1Review: CVE-2022-2639: Linux kernel openvswitch local privilege escalation\n\ud83d\udfe1Review: INDIA'S VARIOUS CITY LEADS\n\ud83d\udfe1Review: ISO payload article and supporting files\n\ud83d\udfe1Review: acis.eoir.justice.gov full data\n\ud83d\udfe1Review: Digital Threats (RESEARCH &amp; PRACTICE - 2021\n\ud83d\udfe1Review: Huawei equipment\n\ud83d\udfe1Review: PS5 4.03 Kernel Exploit\n\ud83d\udfe1Review: US military contractor files and Puerto Rican files\n\ud83d\udfe1Review: kinokassa.ru-orders full\n\ud83d\udfe1Review: bazi.guru Leak Data\n\ud83d\udfe1Review: italonceramica.ru Data Leak\n\ud83d\udfe1Review: Youthmanual.com Leak\n\ud83d\udfe1Review: CHATBOTS-BUILDER.COM Database\n\ud83d\udfe1Review: Entrust.com Data Leak\n\ud83d\udfe1Review: msp.gov.ua SQL Leak\n\ud83d\udfe1Review: Badoo.com Leak Data\n\ud83d\udfe1Review: intimshop.ru Data Leak\n\ud83d\udfe1Review: alpmarathon.ru data leaked\n\ud83d\udfe1Review: Zenler.com Leak Data\n\ud83d\udfe1Review: USA Doctors Database 1M\n\ud83d\udfe1Review: Russian public services database leaked part 2\n\ud83d\udfe1Review: US redawning.com 170k User\n\ud83d\udfe1Review: Avito.ru Leak Data\n\ud83d\udfe1Review: ahcollege.gov.bd Leak Data\n\ud83d\udfe1Review: bookmate.com Leak Data\n\ud83d\udfe1Review: Resident database Russia full\n\ud83d\udfe1Review: kisch.co.il Leak Data\n\ud83d\udfe1Review: 150 UK gamblers database\n\ud83d\udfe1Review: Bangladesh Navy database\n\n\ud83d\ude35\u200d\ud83d\udcab VIP Area Price:\n\n\ud83d\udfe11 Month: $ 50\n\ud83d\udfe1Lifetime: $ 250\n\n\ud83d\udd25Support: @clubHydra\u2708\ufe0f", "creation_timestamp": "2022-10-18T15:26:23.000000Z"}, {"uuid": "0101137c-096a-4841-9fdd-da2d2353417e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/491", "content": "\u200b\u200bCVE-2022-2639 &amp; -/-/32250 : Linux kernel &lt;= 5.13 openvswitch local privilege escalation Using pipe-primitive &amp; Linux Kernel LPE &lt;=5.18.1 - local user to escalate privileges to root\nRepo : https://github.com/veritas501/CVE-2022-2639-PipeVersion\nRepo : https://github.com/theori-io/CVE-2022-32250-exploit", "creation_timestamp": "2022-09-30T06:30:07.000000Z"}, {"uuid": "3432aca5-61e1-4e53-868f-b8590bec035f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26393", "type": "seen", "source": "https://t.me/cibsecurity/49508", "content": "\u203c CVE-2022-26393 \u203c\n\nThe Baxter Spectrum WBM is susceptible to format string attacks via application messaging. An attacker could use this to read memory in the WBM to access sensitive information or cause a Denial of Service (DoS) on the WBM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T18:29:27.000000Z"}, {"uuid": "0172b46c-3eea-4d02-9d75-e05c88a3d76a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-26390", "type": "seen", "source": "https://t.me/cibsecurity/49494", "content": "\u203c CVE-2022-26390 \u203c\n\nThe Baxter Spectrum Wireless Battery Module (WBM) stores network credentials and PHI (only applicable to Spectrum IQ pumps using auto programming) in unencrypted form. An attacker with physical access to a device that hasn't had all data and settings erased may be able to extract sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-09T18:26:23.000000Z"}, {"uuid": "a03fdd72-a268-4555-bfae-8afd81b34741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "https://t.me/cibsecurity/49214", "content": "\u203c CVE-2022-2639 \u203c\n\nAn integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-02T00:38:43.000000Z"}, {"uuid": "aef5363a-0d75-485e-bd28-fc73fbcfcf3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "https://t.me/LearnExploit/3793", "content": "CVE-2022-2639\n\nLinux kernel openvswitch local privilege escalation\n\nExploit\n\n#exploit #linux\n\u2014\u2014\u2014\u2014\u2014\u2014\u200c\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-11-12T16:31:24.000000Z"}, {"uuid": "50502b88-4e4c-4e29-a3ce-1877cac669c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:03.000000Z"}, {"uuid": "bf32d65c-7874-4055-86ca-dafc410ed9ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2639", "type": "seen", "source": "Telegram/TXmZ8EBGvdc4uufvEqu6hfgyjEc7K_gjD1Jpp8Uzvu6-KK0", "content": "", "creation_timestamp": "2023-03-23T09:18:19.000000Z"}]}