{"uuid": "79d7ff6a-bdc5-4d13-a311-94f14cf18d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0540", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5972", "content": "#Red_Team_Tactics\n1. Weaponizing An Antivirus Driver\nhttps://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver\n2. Authentication bypass in Seraph (CVE-2022-0540)\nhttps://blog.viettelcybersecurity.com/cve-2022-0540-authentication-bypass-in-seraph", "creation_timestamp": "2022-05-09T12:46:38.000000Z"}