{"uuid": "9e9b167a-3441-4fda-b09f-bbf24773b683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41128", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7324", "content": "#exploit\n1. Linux Kernel Exploit Development: 1-day case study\nhttps://blog.hacktivesecurity.com/index.php/2022/06/13/linux-kernel-exploit-development-1day-case-study\n\n2. CVE-2021-38003:\nVulnerability that exists in the V8 Javascript engine\nhttps://starlabs.sg/blog/2022/12-the-hole-new-world-how-a-small-leak-will-sink-a-great-browser-cve-2021-38003\n]-&gt; https://github.com/SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003\n\n3. CVE-2022-41128:\nType confusion in Internet Explorer's JScript9 engine\nhttps://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2022/CVE-2022-41128.html", "creation_timestamp": "2023-01-11T06:11:00.000000Z"}