{"vulnerability": "cve-2022-4270", "sightings": [{"uuid": "4409423b-053d-4ccf-82ae-66d0bf441a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html", "content": "", "creation_timestamp": "2022-12-08T19:04:00.000000Z"}, {"uuid": "f4d9d25d-9a7e-473f-8ae2-55f2313ad2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10546", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Exploiting CVE-2022-42703 - Bringing back the stack attack.\n\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html", "creation_timestamp": "2022-12-13T13:04:53.000000Z"}, {"uuid": "711a90ee-a058-489b-99d3-0cd26eae6864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "e0e8348b-8c5e-4e5a-b7c7-8ac947c595cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html", "content": "", "creation_timestamp": "2025-08-08T08:43:00.000000Z"}, {"uuid": "8710628a-6839-40d8-8a86-9a608be31d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://projectzero.google/2025/11/defeating-kaslr-by-doing-nothing-at-all.html", "content": "", "creation_timestamp": "2025-11-03T07:00:00.000000Z"}, {"uuid": "72cf33e6-3ab0-4b49-8347-c8f0b4a8a25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://projectzero.google/2025/08/from-chrome-renderer-code-exec-to-kernel.html", "content": "", "creation_timestamp": "2025-08-08T05:00:00.000000Z"}, {"uuid": "7b0e3216-eab4-4f0b-a266-a10f93a49cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/11/defeating-kaslr-by-doing-nothing-at-all.html", "content": "", "creation_timestamp": "2025-11-03T17:09:00.000000Z"}, {"uuid": "ace802a0-ecb8-4f25-917a-3a7cff64c9a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://t.me/ctinow/80375", "content": "Exploiting CVE-2022-42703 - Bringing back the stack attack\n\nhttps://ift.tt/5sMAeyf", "creation_timestamp": "2022-12-08T20:20:35.000000Z"}, {"uuid": "8f845f5e-c017-4151-a3c2-b6b50c6518a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/212", "content": "Top Security News for 14/12/2022\n\nMicrosoft Patch Tuesday fixes six critical vulnerabilities\nhttps://malware.news/t/microsoft-patch-tuesday-fixes-six-critical-vulnerabilities/65717#post_1 \n\nExploiting CVE-2022-42703 - Bringing back the stack attack\nhttps://www.reddit.com/r/lowlevel/comments/zge0om/exploiting_cve202242703_bringing_back_the_stack/ \n\nCybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware\nhttps://thehackernews.com/2022/12/cybersecurity-experts-uncover-inner.html \n\nCitrix and NSA urge admins to fix actively exploited zero-day in Citrix ADC and Gateway\nhttps://securityaffairs.co/wordpress/139609/apt/citrix-adc-gateway-cve-2022-27518.html \n\nSerious Attacks Could Have Been Staged Through This Amazon ECR Public Gallery Vulnerability\nhttps://thehackernews.com/2022/12/serious-attacks-could-have-been-staged.html \n\nNEW 'Off The Wall' ONLINE\nhttps://www.2600.com/wall/13-12-2022 \n\nSecurity Alert: Microsoft Releases December 2022 Security Updates\nhttps://malware.news/t/security-alert-microsoft-releases-december-2022-security-updates/65720#post_1 \n\nISC Stormcast For Wednesday, December 14th, 2022 https://isc.sans.edu/podcastdetail.html?id=8290, (Wed, Dec 14th)\nhttps://malware.news/t/isc-stormcast-for-wednesday-december-14th-2022-https-isc-sans-edu-podcastdetail-html-id-8290-wed-dec-14th/65721#post_1 \n\nISC Stormcast For Wednesday, December 14th, 2022 https://isc.sans.edu/podcastdetail.html?id=8290, (Wed, Dec 14th)\nhttps://isc.sans.edu/diary/rss/29342 \n\nPCI Secure Software Standard version 1.2 sets out new payment security requirements\nhttps://www.csoonline.com/article/3682656/pci-secure-software-standard-version-1-2-sets-out-new-payment-security-requirements.html#tk.rss_all \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2022-12-14T08:17:29.000000Z"}, {"uuid": "048a026e-3afc-4fc3-a4d3-af1059863aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/198", "content": "Exploiting CVE-2022-42703 - Bringing back the stack attack\n\nAn article by Seth Jenkins about exploiting a slab use-after-free side effect of a logical bug in the memory subsystem found by Jann Horn.\n\nSeth used a cross-cache attack to overwrite an anon_vma structure and gain a limited arbitrary-write primitive. Seth then modified the context saved to the fixed-address cpu_entry_area region during a hardware exception. This allowed to corrupt the size passed to copy_to/from_user calls and thus get controlled stack read and write buffer overflows.\n\nThe article additionally expands on how KASLR is useless against local attackers due to side-channel vulnerabilities.", "creation_timestamp": "2022-12-12T19:59:11.000000Z"}, {"uuid": "7f706246-2d52-4ed7-8432-7747f5548fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4270", "type": "seen", "source": "https://t.me/cibsecurity/53798", "content": "\u203c CVE-2022-4270 \u203c\n\nIncorrect privilege assignment issue in M-Files Web in M-Files Web versions before 22.5.11436.1 could have changed permissions accidentally.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-02T16:36:54.000000Z"}, {"uuid": "90bb1fbc-9c2e-491c-8432-3a592715c83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://t.me/proxy_bar/1253", "content": "Exploiting CVE-2022-42703 - Bringing back the stack attack \n\u041a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0442\u0435\u043a\u0430\u0435\u0442 \u043f\u0430\u043c\u044f\u0442\u044c - \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c\n\n#linux #memory #exploit", "creation_timestamp": "2023-01-04T13:47:34.000000Z"}, {"uuid": "f06942c8-ccc2-45e5-a638-a95fd155ad64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "Telegram/69mC2wBue__qYjXhi5dK-VPm3xd-cCKD3nV2N2qXwYW8plo", "content": "", "creation_timestamp": "2023-01-31T18:24:06.000000Z"}, {"uuid": "2e6a5412-4ccf-4f5c-90e4-d2146afc8e68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1744", "content": "#exploit\n1. Exploiting CVE-2022-42703 - Bringing back the stack attack\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html\n\n2. CVE-2022-36537:\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT", "creation_timestamp": "2022-12-13T04:12:35.000000Z"}, {"uuid": "d2a73ef0-ca2e-472c-a071-fd410532236d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42706", "type": "seen", "source": "https://t.me/cibsecurity/54042", "content": "\u203c CVE-2022-42706 \u203c\n\nAn issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:35.000000Z"}, {"uuid": "0b088676-e3dc-4f41-ae0e-cbd334947016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://t.me/cibsecurity/51054", "content": "\u203c CVE-2022-42703 \u203c\n\nmm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-10T02:23:31.000000Z"}, {"uuid": "58c9d9eb-0880-4b9d-8ffa-412c33815cc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42705", "type": "seen", "source": "https://t.me/cibsecurity/54038", "content": "\u203c CVE-2022-42705 \u203c\n\nA use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T00:40:31.000000Z"}, {"uuid": "a9db5456-409e-4ec2-89e5-93a03593cf5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6797", "content": "Exploiting CVE-2022-42703 - Bringing back the stack attack\n\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html", "creation_timestamp": "2022-12-12T11:05:00.000000Z"}, {"uuid": "2bbb6d16-4b94-463d-9116-2baa22cc0796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6806", "content": "Exploiting CVE-2022-42703 - Bringing back the stack attack\n\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html", "creation_timestamp": "2022-12-13T20:22:44.000000Z"}, {"uuid": "7d2786e0-5ac5-4aed-98b4-aac853542a3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7335", "content": "#exploit\n1. Exploiting CVE-2022-42703 - Bringing back the stack attack\nhttps://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html\n\n2. CVE-2022-36537:\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT", "creation_timestamp": "2022-12-12T05:57:24.000000Z"}, {"uuid": "ad0efdd7-576d-4fcd-8e78-56a9ec0ac8cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/4385", "content": "Project Zero ( Exploiting CVE-2022-42703 - Bringing back the stack attack )\n\nlink \n\n#CVE #Exploit \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:38.000000Z"}, {"uuid": "092472cc-3068-4f54-a0c2-f556eee3189f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-42703", "type": "seen", "source": "https://t.me/LearnExploit/4402", "content": "Exploiting CVE-2022-42703 ( Bringing back the stack attack )\n\nRead\n\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:39.000000Z"}]}