{"vulnerability": "CVE-2024-2680", "sightings": [{"uuid": "502213fd-3aff-4a87-b0ba-b359ab591e4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/25877", "content": "\u26a1\ufe0fCVE-2024-26808: PoC Exploit Shows Local Privilege Escalation Risk in Linux.\n\n#CyberBulletin", "creation_timestamp": "2024-09-30T11:01:28.000000Z"}, {"uuid": "79fba005-7896-4027-b512-c6abde98aa79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "published-proof-of-concept", "source": "https://t.me/anti_malware/20403", "content": "\ud83c\udfaf \u0413\u043b\u0430\u0432\u043d\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0434\u043d\u044f | 12 \u043c\u0430\u044f\n\n\ud83d\udee0 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043a double-free \u0432 Linux Netfilter\n\u0412 \u044f\u0434\u0440\u0435 Linux \u0441\u043d\u043e\u0432\u0430 \u043f\u0440\u043e\u0431\u043e\u0438\u043d\u0430: \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-26809 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u0440\u0430\u0431\u043e\u0447\u0438\u0439 PoC, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e root. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u043f\u0440\u0438 \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0435\u043d\u0438\u0438 dirty-\u043d\u0430\u0431\u043e\u0440\u043e\u0432 \u0432 nf\\_tables \u2014 \u0438 \u0434\u0430, \u044d\u0442\u043e \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 double-free. \u0410\u0442\u0430\u043a\u0430 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 CAP\\_NET\\_ADMIN \u0432 user namespace. \u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u044f\u0434\u0440\u0430 \u043e\u0442 5.15.54 \u0438 6.1-rc1. \u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0443\u0436\u043d\u043e \u0441\u0440\u043e\u0447\u043d\u043e.\n\n\u2696\ufe0f \u0421\u0447\u0451\u0442\u043d\u0430\u044f \u043f\u0430\u043b\u0430\u0442\u0430: \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0437\u0430\u0446\u0438\u044f \u0441\u0443\u0434\u043e\u0432 \u0432 \u0420\u0424 \u043f\u0440\u043e\u0432\u0430\u043b\u0438\u043b\u0430\u0441\u044c\n\u041e\u0442\u0447\u0451\u0442 \u0421\u041f \u043f\u043e\u043a\u0430\u0437\u0430\u043b: \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0435\u043a\u0442\u044b \u0431\u0443\u043a\u0441\u0443\u044e\u0442, \u0413\u0410\u0421 \u00ab\u041f\u0440\u0430\u0432\u043e\u0441\u0443\u0434\u0438\u0435\u00bb \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e, \u043c\u043d\u043e\u0433\u0438\u0435 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043c\u043e\u0440\u0430\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u0440\u0435\u043b\u0438. \u041a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0434\u0435\u043b \u0440\u0430\u0441\u0442\u0451\u0442, \u0430 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u043e\u0441\u0442\u0430\u0438\u0432\u0430\u0435\u0442. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0418\u0422 \u0438 \u0432\u0432\u0435\u0441\u0442\u0438 KPI \u0434\u043b\u044f \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\ud83e\udde0 Security Vision \u0443\u0447\u0438\u0442 \u0434\u0435\u0442\u0435\u0439 \u0438 \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 \u0437\u0430\u0449\u0438\u0449\u0430\u0442\u044c\u0441\u044f \u0432 \u0441\u0435\u0442\u0438\n\u00ab\u0410\u043a\u0430\u0434\u0435\u043c\u0438\u044f \u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u00bb \u2014 \u043d\u043e\u0432\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u0441 \u043e\u0431\u0443\u0447\u0430\u044e\u0449\u0438\u043c\u0438 \u043a\u0432\u0435\u0441\u0442\u0430\u043c\u0438, \u0432\u0438\u043a\u0438, \u0442\u0435\u0441\u0442\u0430\u043c\u0438 \u0438 \u043f\u0440\u043e\u0444\u043e\u0440\u0438\u0435\u043d\u0442\u0430\u0446\u0438\u0435\u0439 \u0432 \u0418\u0411. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043f\u043e\u043b\u0435\u0437\u043d\u0430 \u043c\u043e\u043b\u043e\u0434\u044b\u043c, \u043a\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u043f\u0435\u0440\u0432\u044b\u0435 \u0448\u0430\u0433\u0438 \u0432 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u043c \u043c\u0438\u0440\u0435. \u0415\u0441\u0442\u044c \u0434\u0430\u0436\u0435 \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b \u0434\u043b\u044f \u0440\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439.\n\n\ud83d\udd10 VPN \u0441 \u0413\u041e\u0421\u0422 \u043f\u043e-\u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443: Ideco NGFW + \u0420\u0443\u0442\u043e\u043a\u0435\u043d \u042d\u0426\u041f 3.0\n\u0422\u0435\u043f\u0435\u0440\u044c \u0432 Ideco NGFW 19 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0435 \u0442\u043e\u043a\u0435\u043d\u044b \u0434\u043b\u044f \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 Site-to-Site \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0413\u041e\u0421\u0422-\u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b, \u043a\u043b\u044e\u0447\u0438 \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u0432\u043d\u0443\u0442\u0440\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0438 \u043d\u0435 \u043f\u043e\u043a\u0438\u0434\u0430\u044e\u0442 \u0435\u0433\u043e. \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e, \u043f\u0440\u043e\u0441\u0442\u043e, \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043e.\n\n\ud83d\udea6 Solar NGFW 1.6: \u0431\u043e\u043b\u044c\u0448\u0435 \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440, \u043c\u0435\u043d\u044c\u0448\u0435 \u0440\u0443\u0447\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u044b\n\u041d\u043e\u0432\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043e\u0442 \u00ab\u0421\u043e\u043b\u0430\u0440\u00bb \u2014 \u044d\u0442\u043e 2000+ \u043d\u043e\u0432\u044b\u0445 \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 BGP, DHCP \u0438 NTP, \u043f\u043b\u044e\u0441 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439. \u0426\u0435\u043b\u044c \u2014 \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u044b \u0438 \u043e\u0431\u043b\u0435\u0433\u0447\u0438\u0442\u044c \u0436\u0438\u0437\u043d\u044c \u0418\u0411-\u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c.\n\n\ud83c\udfad \u0418\u043d\u0432\u0435\u0441\u0442\u0441\u043a\u0430\u043c \u0441 Telegram-\u043c\u0430\u0441\u043a\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0441 VPN\nF6 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0441\u0430\u0439\u0442\u044b, \u0437\u0430\u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u0434 Telegram Premium. \u0412\u0441\u0451 \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u043f\u0440\u0430\u0432\u0434\u043e\u043f\u043e\u0434\u043e\u0431\u043d\u043e, \u043d\u043e \u0446\u0435\u043b\u044c \u043e\u0434\u043d\u0430 \u2014 \u0432\u044b\u043c\u0430\u043d\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u0432\u0442\u044f\u043d\u0443\u0442\u044c \u0432 \u0444\u0435\u0439\u043a\u043e\u0432\u044b\u0435 \u00ab\u0438\u043d\u0432\u0435\u0441\u0442\u043f\u0440\u043e\u0435\u043a\u0442\u044b\u00bb. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0431\u044c\u044e\u0442 \u043f\u043e VPN-\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0438 \u043c\u0438\u0433\u0440\u0430\u043d\u0442\u0430\u043c.\n\n\ud83e\udde8 LockBit \u0441\u043d\u043e\u0432\u0430 \u0443\u043d\u0438\u0437\u0438\u043b\u0438: \u0441\u043b\u0438\u0442\u044b \u0434\u0430\u043c\u043f\u044b, \u043f\u0430\u0440\u043e\u043b\u0438, \u0447\u0430\u0442\u044b \u0438 \u0431\u0438\u043b\u0434\u044b\n\u041d\u0430 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u043e\u043c \u0441\u0430\u0439\u0442\u0435 \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u043a\u0438 LockBit \u0442\u0435\u043f\u0435\u0440\u044c \u043a\u0440\u0430\u0441\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0441\u043b\u0430\u043d\u0438\u0435 \u043e\u0442 \u00ab\u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438\u0437 \u041f\u0440\u0430\u0433\u0438\u00bb \u0438 \u0441\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u0430\u0440\u0445\u0438\u0432 \u0441 \u043f\u043e\u043b\u043d\u043e\u0439 \u0431\u0430\u0437\u043e\u0439 MySQL. \u0423\u0442\u0435\u043a\u043b\u0438 \u043f\u0435\u0440\u0435\u043f\u0438\u0441\u043a\u0438 \u0441 \u0436\u0435\u0440\u0442\u0432\u0430\u043c\u0438, \u0431\u0438\u0442\u043a\u043e\u0438\u043d-\u0430\u0434\u0440\u0435\u0441\u0430, \u043b\u043e\u0433\u0438\u043d\u044b \u0438 \u0434\u0430\u0436\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0432\u0440\u043e\u0434\u0435 Lockbitproud231. \u042d\u0442\u043e \u0443\u0436\u0435 \u0432\u0442\u043e\u0440\u043e\u0439 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0439 \u0443\u0434\u0430\u0440 \u043f\u043e \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0435 \u0437\u0430 \u043f\u043e\u043b\u0433\u043e\u0434\u0430.", "creation_timestamp": "2025-05-12T18:00:01.000000Z"}, {"uuid": "55709ab1-ffa1-4643-9a53-9c1009c52400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3254", "content": "https://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nLinux kernel Netfilter Use-After-Free leads to LPE\n#github #poc", "creation_timestamp": "2024-10-01T05:09:16.000000Z"}, {"uuid": "5b6e1d9f-4c93-4ee5-87dc-604829da6d67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11213", "content": "#exploit\n1. CVE-2024-26808:\nLinux kernel Netfilter UaF leads to LPE\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\n2. CVE-2024-38200:\nMS Office NTLMv2 Disclosure\nhttps://github.com/passtheticket/CVE-2024-38200\n\n3. CVE-2024-7965:\nInappropriate implementation in V8 (ARM64)\nhttps://github.com/bi-zone/CVE-2024-7965", "creation_timestamp": "2024-09-30T22:42:48.000000Z"}, {"uuid": "99c5bbf1-d524-4f7e-b8a2-1d7c407ac5de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/496", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:02.000000Z"}, {"uuid": "ee344c6c-6f2c-463a-b3c0-ceefaa9c4d91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lozp7km5im27", "content": "", "creation_timestamp": "2025-05-13T04:59:12.042080Z"}, {"uuid": "96c29ca3-afe7-4628-86a1-ee704b3e8a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lp4ffexssc2q", "content": "", "creation_timestamp": "2025-05-14T06:41:33.647748Z"}, {"uuid": "587b78ff-9bd9-4c74-920d-64f891826425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lp4ffkghgm2f", "content": "", "creation_timestamp": "2025-05-14T06:41:34.376864Z"}, {"uuid": "3e5e72db-7c0a-406c-bf04-e38a99529a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26807", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "f3d328c7-a80e-4ae4-9a94-bb031915f464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2680", "type": "seen", "source": "Telegram/Qt_-boTTv9eLz3ExfOdNTHpWjYC09U7xrrgRPa06EgzHZMA4", "content": "", "creation_timestamp": "2025-02-19T22:21:29.000000Z"}, {"uuid": "12e3c470-31ea-4534-9564-9b021255fca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13701", "content": "\u2604\ufe0f \ud83d\udc27 Linux kernel Netfilter Use-After-Free leads to LPE.\n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md", "creation_timestamp": "2024-10-02T09:41:13.000000Z"}, {"uuid": "c156fbcc-b645-4def-9fc5-b7599eaf4fd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "seen", "source": "https://t.me/CyberBulletin/988", "content": "\u26a1\ufe0fCVE-2024-26808: PoC Exploit Shows Local Privilege Escalation Risk in Linux.\n\n#CyberBulletin", "creation_timestamp": "2024-09-30T09:53:53.000000Z"}, {"uuid": "095e61f4-a7bf-4256-85ed-6253da9a6666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/520", "content": "https://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nLinux kernel Netfilter Use-After-Free leads to LPE\n#github #poc", "creation_timestamp": "2024-10-01T16:11:48.000000Z"}, {"uuid": "51c4eb98-44bc-4f2b-9266-e157922dcfe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "seen", "source": "https://t.me/HackerArsenal/505", "content": "CVE-2024-26808 \n*\nLocal Privilege Escalation Risk in Linux\n*\nWriteUp\n*\nExploit\n\n#linux #lpe", "creation_timestamp": "2024-09-30T10:11:26.000000Z"}, {"uuid": "85c1054a-b65b-4716-8ee5-beb9cc2fc6eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2281", "content": "CVE-2024-26808 \n*\nLocal Privilege Escalation Risk in Linux\n*\nWriteUp\n*\nExploit\n\n#linux #lpe", "creation_timestamp": "2024-09-30T09:23:43.000000Z"}, {"uuid": "b0174f1e-113d-4c4c-a4ec-9f4b5327f3b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3lox2gvyftv27", "content": "", "creation_timestamp": "2025-05-12T03:42:13.225509Z"}, {"uuid": "03f2b592-66f0-4e7c-9daa-5341a97096ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3loxdsa5sdv27", "content": "", "creation_timestamp": "2025-05-12T06:29:33.522372Z"}, {"uuid": "da2dde34-59cb-4414-8cfd-e9bb91f61eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-26809", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3loxgw3jnjs2e", "content": "", "creation_timestamp": "2025-05-12T07:25:24.437448Z"}, {"uuid": "284d08de-bed2-4012-ae3a-7bbdbe7db937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3loxinggjzi2e", "content": "", "creation_timestamp": "2025-05-12T07:56:21.579819Z"}, {"uuid": "12c94bca-d381-4b6b-ad39-bf184a58f307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3loxkg53qw62v", "content": "", "creation_timestamp": "2025-05-12T08:28:04.281219Z"}, {"uuid": "24bb9b7a-c1bb-4eb3-9e3c-775b3e86a716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3loxkgdwck2z2", "content": "", "creation_timestamp": "2025-05-12T08:28:21.243446Z"}, {"uuid": "4a29747e-8b2d-488c-8aed-c592ba56a4f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-26809", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3loxkm7igq6r2", "content": "", "creation_timestamp": "2025-05-12T08:31:37.185522Z"}, {"uuid": "c1dd0585-28f4-4a69-b38b-a3f920387238", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loxsgqcoa6r2", "content": "", "creation_timestamp": "2025-05-12T10:54:32.733868Z"}, {"uuid": "5fbfe33e-4b38-4d9b-a9fc-7f7b0cd28de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3loymp4guli2j", "content": "", "creation_timestamp": "2025-05-12T18:41:33.257348Z"}, {"uuid": "84de84f3-c029-4763-abbe-5a84dd7ba435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loympbxhnan2", "content": "", "creation_timestamp": "2025-05-12T18:42:53.712985Z"}, {"uuid": "b85eb1e9-7fa6-49cb-8347-abb73350060a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26801", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "52244880-c82e-4a15-9d55-27e947013037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26805", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "b308600a-b78a-4d79-9d7d-9de15f07cece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26804", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "0fb93fb3-f279-4be5-b9b9-d58e8cc37af0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-26807", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "25be348e-6330-4c84-afae-6a5b1e1cfd75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "seen", "source": "https://t.me/ZeroEthical_Course/1613", "content": "CVE-2024-26808 \n*\nLocal Privilege Escalation Risk in Linux\n*\nWriteUp\n*\nExploit\n\n#linux #lpe", "creation_timestamp": "2024-09-30T09:29:32.000000Z"}, {"uuid": "ef1be988-c3f7-437a-999c-49a4fee9465f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4914", "content": "#exploit\n1. CVE-2024-26808:\nLinux kernel Netfilter UaF leads to LPE\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\n2. CVE-2024-38200:\nMS Office NTLMv2 Disclosure\nhttps://github.com/passtheticket/CVE-2024-38200\n\n3. CVE-2024-7965:\nInappropriate implementation in V8 (ARM64)\nhttps://github.com/bi-zone/CVE-2024-7965", "creation_timestamp": "2024-10-02T16:38:48.000000Z"}, {"uuid": "c03d1b9d-848d-4a9d-ad67-4a17af81fa1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/pt_soft/368", "content": "CVE-2024-26808 Linux kernel Netfilter Use-After-Free leads to LPE\n\nCVE-2024-26808 is a use-after-free vulnerability within the Linux Kernel Netfilter, a powerful framework integral to the Linux networking stack. Netfilter provides essential networking operations such as packet filtering, network address translation (NAT), and port forwarding. The flaw arises from improper handling of network packet processing, leading to the potential for unauthorized memory access.\n\nWriteup: https://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md", "creation_timestamp": "2024-09-30T10:53:00.000000Z"}, {"uuid": "7b6bbbe8-1598-4165-b2c6-3abb76ea2310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8879", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:55.000000Z"}, {"uuid": "3cc43c4a-0936-4c5c-8d61-a79614ec283a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24069", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:01.000000Z"}, {"uuid": "33219d87-8252-45a7-a2fd-957eb8680f1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3792", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling  \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/  \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark  \n\nScriptSentry finds misconfigured and dangerous logon scripts.  \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:42.000000Z"}, {"uuid": "021423fa-e2c5-4983-9131-33d22a951971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/ZeroDay_TM/877", "content": "- CVE-2024-26808: Linux kernel Netfilter UaF leads to LPE\n\nLink: https://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\n#exploit #writeup #linux\n-   -   -   -   -   -   -   -   -\n\u2022 @Old_Unclee\n\u2022 @ZeroDay_TM", "creation_timestamp": "2024-10-01T01:55:32.000000Z"}, {"uuid": "7790993f-1474-4609-9ba7-4dec34144325", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lp2bhmljfu2p", "content": "", "creation_timestamp": "2025-05-13T10:25:49.249063Z"}, {"uuid": "05692b2c-1536-4158-8e78-3f8b9e690131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lp2bhqh6zae2", "content": "", "creation_timestamp": "2025-05-13T10:25:59.638224Z"}, {"uuid": "b5e7c15f-1c85-44ff-8012-4a65760cb448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lp2ln3x3ji2p", "content": "", "creation_timestamp": "2025-05-13T13:27:50.506491Z"}, {"uuid": "4922129d-8d58-4ee6-92f3-a42d51c42c94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lp2lnbndy4z2", "content": "", "creation_timestamp": "2025-05-13T13:28:02.920283Z"}, {"uuid": "416bbc77-3a5f-4f61-8e07-e23a3b945bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lp2zw62cl52v", "content": "", "creation_timestamp": "2025-05-13T17:43:27.069467Z"}, {"uuid": "2c2651ef-869f-4682-a364-7da159f4dde6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2zw3i7dqw2", "content": "", "creation_timestamp": "2025-05-13T17:55:13.185347Z"}, {"uuid": "e09e679f-c3c3-4ff0-8286-a4bd6c10b1d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lp3c5tpxbu2e", "content": "", "creation_timestamp": "2025-05-13T20:10:54.564072Z"}, {"uuid": "be2b318d-4055-4796-a7fa-571afe63766b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lp3c626srjr2", "content": "", "creation_timestamp": "2025-05-13T20:11:13.890064Z"}, {"uuid": "fc86da9e-67e3-49fe-95c8-e1dab64d6ce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lp5lez26ep2s", "content": "", "creation_timestamp": "2025-05-14T18:01:18.161406Z"}, {"uuid": "dcb77f62-3bd7-45b3-92f9-8c61ca11724f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp5lgfd4c742", "content": "", "creation_timestamp": "2025-05-14T18:06:08.819830Z"}, {"uuid": "1e79ddd3-19ba-482e-acac-17db8c33f150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp6yj4bakwr2", "content": "", "creation_timestamp": "2025-05-15T07:29:01.426507Z"}, {"uuid": "8fedd498-6b80-43b0-90a9-fb1de8e7378b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26802", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m4xm3vroas2j", "content": "", "creation_timestamp": "2025-11-06T12:50:54.298273Z"}, {"uuid": "4412c7ec-5c0f-477d-bc64-496b04a910df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1592", "content": "#exploit\n1. CVE-2024-26808:\nLinux kernel Netfilter UaF leads to LPE\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\n2. CVE-2024-38200:\nMS Office NTLMv2 Disclosure\nhttps://github.com/passtheticket/CVE-2024-38200\n\n3. CVE-2024-7965:\nInappropriate implementation in V8 (ARM64)\nhttps://github.com/bi-zone/CVE-2024-7965", "creation_timestamp": "2024-10-02T16:38:49.000000Z"}, {"uuid": "e980e1fc-c65d-4002-bf1a-f96aa52ea0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26809", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/3251", "content": "\u26a1\ufe0fPoC Released: CVE-2024-26809 Exploits nftables Double-Free to Achieve Root Shell.\n\n#CyberBulletin", "creation_timestamp": "2025-05-12T14:03:20.000000Z"}, {"uuid": "71da6b0c-eee4-430f-8dee-94803601256b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1063", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:50.000000Z"}, {"uuid": "10479ad1-3ffb-4257-9c73-c6d8157511dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-26808", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7514", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:55.000000Z"}]}