{"vulnerability": "CVE-2022-24481", "sightings": [{"uuid": "80549cef-753e-46ad-8c11-0814951f5ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24481", "type": "seen", "source": "https://t.me/cibsecurity/40961", "content": "\u203c CVE-2022-24481 \u203c\n\nWindows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24521.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T22:36:46.000000Z"}, {"uuid": "2ad75f20-d5d1-4217-aafb-c7771414041a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24481", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8300", "content": "#exploit\n1. CompMgmtLauncher &amp; Sharepoint DLL Search Order hijacking UAC persist via OneDrive\nhttps://github.com/hackerhouse-opensource/CompMgmtLauncher_DLL_UACBypass\n\n2. CVE-2022-24481:\nWindows Common Log File System Driver EoP Vulnerability\nhttps://github.com/robotMD5/CVE-2022-24481-POC\n\n3. 0VIX Exploit Post-Mortem &amp; Steps to Recovery\nhttps://0vixprotocol.medium.com/0vix-exploit-post-mortem-15c882dcf479", "creation_timestamp": "2023-05-15T10:59:01.000000Z"}, {"uuid": "f456219d-19a3-4870-9f80-e37ad2037870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24481", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3009", "content": "Tools - Hackers Factory\n\n\nPsudohash \n\nPassword List Generator For Orchestrating Brute Force Attacks.\n\nThis is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a word's letters with symbols or numbers, using char-case variations, adding a common padding before or after the word and more.\n\nhttps://github.com/t3l3machus/psudohash\n\n#redteam #password #infosec #bruteforce\n\nSmbCrawler\n\nSmbCrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares. \n\nhttps://github.com/SySS-Research/smbcrawler\n\n#infosec #pentesting #bugbounty\n\nCVE-2022-24481\n\nWindows Common Log File System Driver EoP Vulnerability.\n\nhttps://github.com/robotMD5/CVE-2022-24481-POC\n\n#cybersecurity #infosec #pentesting\n\nPwndbg\n\nExploit Development and Reverse Engineering with GDB Made Easy.\n\nhttps://github.com/pwndbg/pwndbg\n\n#reversing #cybersecurity #infosec\n\nCVE-2023-32243\n\nEssential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation.\n\nhttps://github.com/RandomRobbieBF/CVE-2023-32243\n\n#cve #infosec #cybersecurity\n\nObfuscated SharpCollection\n\nQuick and dirty stab at automated Obfuscation using yetAnotherObfuscator together with fresh builds of common C# offensive tools, in a CDI fashion using Azure DevOps release pipelines.\n\nhttps://github.com/Flangvik/ObfuscatedSharpCollection\n\n#infosec #pentesting #redteam\n\nSnapchange\n\nLightweight fuzzing of a memory snapshot using KVM.\n\nhttps://github.com/awslabs/snapchange\n\n#fuzzing #cybersecurity #infosec\n\nBLACKHAT_Asia2023\n\nJust About BLACKHAT USA2022 PDF Public. File List, Search what your intersting.\n\nhttps://github.com/Mr-xn/BLACKHAT_Asia2023\n\n#infosec #pentesting #redteam\n\nGoogle Dork Search\n\nThe tool queries Google search engine to find web pages that may be vulnerable to LFI attacks based on certain Google dorks. It then analyzes the responses of these pages to determine if any LFI vulnerabilities exist.\n    \nhttps://github.com/capture0x/Lfi-Space\n\n#infosec #pentesting #redteam\n\nRedCaddy \n\nC2 redirector base on caddy.\n\n\u2022 Block IP by GEOIP country\n\u2022 Allow requests by header matcher\n\u2022 User-agent &amp; IP blacklist\n\u2022 Support multiple redirection\n\u2022 TeamServer port warden\n\nhttps://github.com/XiaoliChan/RedCaddy\n\n#infosec #pentesting #redteam\n\nHunt-Weird-ImageLoads\n\nThis project was created to play with different IOCs caused by Imageload events.\n\nhttps://github.com/thefLink/Hunt-Weird-ImageLoads\n\n#cybersecurity #infosec\n\nDNS Validator\n\nMaintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.\n\nhttps://github.com/vortexau/dnsvalidator\n\n#infosec #pentesting #bugbounty\n\nMaldev\n\nmaldev aims to help malware developers, red teamers and anyone who is interested in cybersecurity. It uses native Golang code and some other useful packages like Hooka which I created to perform complex low-level red teaming stuff. \n\nhttps://github.com/D3Ext/maldev\n\n#malware #infosec #redteam\n\nCypherDog 4.3\n\nPoSh BloodHound Dog Whisperer. aka PowerShell Cmdlets to interact with BloodHound Data via Neo4j HTTP API\n\nhttps://github.com/SadProcessor/CypherDog\n\n#infosec #pentesting #redteam\n\nIndicator-Intelligence\n\nFinds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.\n\nhttps://github.com/OsmanKandemir/indicator-intelligence\n\n#recon #infosec #redteam\n\nTLDHunt\n\nDomain Availability Checker\n\nA command-line tool designed to help users find available domain names for their online projects or businesses. By providing a keyword and a list of TLD (top-level domain) extensions, TLDHunt checks the availability of domain names that match the given criteria. \n\nhttps://github.com/yuyudhn/TLDHunt\n\n#infosec #cybersecurity #cybersec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-17T09:20:57.000000Z"}]}