{"vulnerability": "CVE-2022-32744", "sightings": [{"uuid": "fc7e39e3-8c4c-4799-a224-08d357a26f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32744", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/914", "content": "Updates On Hackbyte Forum:-\n\n1. Erebus - Fast and customisable parameter based vulnerability scanner based on simple YAML Rules\n2. Zeratool - Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems\n3. CVE-2022-36946 linux kernel panic in netfilter_queue\n4. CVE-2022-32744: Critical Samba admin password reset flaw\n5. aif_ru Leak\n6. Exactis Company Leak\n7. paidleaf.co_68K Leak\n8. CVE-2022-26712: The POC for SIP-Bypass\n9. CVE-2022-26138: Confluence Hardcoded Password POC\n10. Blizzard-Jailbreak-9: Blizzard Jailbreak for iOS 9.0 - 9.3.6, 32-Bit\n11. Quasar: Remote Administration Tool for Windows\n12. pochta Leak\n13. COINPAYEX.LTD Data Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-24T11:48:28.000000Z"}, {"uuid": "e61546c9-bec8-4512-a3bd-747d084a11f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32744", "type": "published-proof-of-concept", "source": "Telegram/K-NdsruMw1Fym1ldoCgIBSKfSnuSwSHmNQJK0ReNQEl6Hw", "content": "", "creation_timestamp": "2022-08-01T15:43:03.000000Z"}, {"uuid": "aabec6d4-5f6d-44e2-99b4-cbfdd1e923ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32744", "type": "seen", "source": "https://t.me/cibsecurity/48803", "content": "\u203c CVE-2022-32744 \u203c\n\nA flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-25T22:24:22.000000Z"}]}