{"vulnerability": "CVE-2024-46740", "sightings": [{"uuid": "230fe3d1-908c-45e5-9ac2-66add85bade2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "ab0b2146-db9c-492d-b594-3cb4e3f0c71b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3744", "content": "Tools - Hackers Factory \n\nThis a adaption of tomnomnom's kxss tool with a different output format.\n\nhttps://github.com/Emoe/kxss\n\nIdentify and extract files from container formats using.\n\nhttps://github.com/Vector35/blob_extractor\n\n(CVE-2024-46740)[binder ]fix UAF caused by offsets overwrite\n\nhttps://github.com/torvalds/linux/commit/4df153652cc46545722879415937582028c18af5\n\nSmall tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file \n\nhttps://github.com/mandatoryprogrammer/xsshunter-express/blob/main/probe.js#L197 \n\nDump Kerberos tickets from the KCM database of SSSD.\n\nhttps://github.com/synacktiv/kcmdump\n\nGenerate AES128 and AES256 Kerberos keys from a given username, password, and realm\n\nhttps://github.com/seriotonctf/kerberos_aes_key\n\nConfuserEx2 String Decryptor &amp; Full Deobfuscation Guide\n\nhttps://github.com/Dump-GUY/ConfuserEx2_String_Decryptor\n\nConverted and added a C BOF version of \n\nhttps://github.com/rotarydrone/GlobalUnProtect to the TrustedSec BOF repo at \n\nhttps://github.com/trustedsec/CS-Remote-OPs-BOF/tree/main\n\nSubOwner - A Simple tool check for subdomain takeovers\n\nhttps://github.com/ifconfig-me/subowner\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-21T11:03:26.000000Z"}, {"uuid": "478c10f4-d706-49fe-8e38-e00e65841d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/335", "content": "Tools - Hackers Factory \n\nThis a adaption of tomnomnom's kxss tool with a different output format.\n\nhttps://github.com/Emoe/kxss\n\nIdentify and extract files from container formats using.\n\nhttps://github.com/Vector35/blob_extractor\n\n(CVE-2024-46740)[binder ]fix UAF caused by offsets overwrite\n\nhttps://github.com/torvalds/linux/commit/4df153652cc46545722879415937582028c18af5\n\nSmall tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file \n\nhttps://github.com/mandatoryprogrammer/xsshunter-express/blob/main/probe.js#L197 \n\nDump Kerberos tickets from the KCM database of SSSD.\n\nhttps://github.com/synacktiv/kcmdump\n\nGenerate AES128 and AES256 Kerberos keys from a given username, password, and realm\n\nhttps://github.com/seriotonctf/kerberos_aes_key\n\nConfuserEx2 String Decryptor &amp; Full Deobfuscation Guide\n\nhttps://github.com/Dump-GUY/ConfuserEx2_String_Decryptor\n\nConverted and added a C BOF version of \n\nhttps://github.com/rotarydrone/GlobalUnProtect to the TrustedSec BOF repo at \n\nhttps://github.com/trustedsec/CS-Remote-OPs-BOF/tree/main\n\nSubOwner - A Simple tool check for subdomain takeovers\n\nhttps://github.com/ifconfig-me/subowner\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-21T10:52:32.000000Z"}, {"uuid": "157ff7ee-95a8-4260-a5a3-7e994e35c58f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23832", "content": "Tools - Hackers Factory \n\nThis a adaption of tomnomnom's kxss tool with a different output format.\n\nhttps://github.com/Emoe/kxss\n\nIdentify and extract files from container formats using.\n\nhttps://github.com/Vector35/blob_extractor\n\n(CVE-2024-46740)[binder ]fix UAF caused by offsets overwrite\n\nhttps://github.com/torvalds/linux/commit/4df153652cc46545722879415937582028c18af5\n\nSmall tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file \n\nhttps://github.com/mandatoryprogrammer/xsshunter-express/blob/main/probe.js#L197 \n\nDump Kerberos tickets from the KCM database of SSSD.\n\nhttps://github.com/synacktiv/kcmdump\n\nGenerate AES128 and AES256 Kerberos keys from a given username, password, and realm\n\nhttps://github.com/seriotonctf/kerberos_aes_key\n\nConfuserEx2 String Decryptor &amp; Full Deobfuscation Guide\n\nhttps://github.com/Dump-GUY/ConfuserEx2_String_Decryptor\n\nConverted and added a C BOF version of \n\nhttps://github.com/rotarydrone/GlobalUnProtect to the TrustedSec BOF repo at \n\nhttps://github.com/trustedsec/CS-Remote-OPs-BOF/tree/main\n\nSubOwner - A Simple tool check for subdomain takeovers\n\nhttps://github.com/ifconfig-me/subowner\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-21T10:52:31.000000Z"}, {"uuid": "b5297521-4714-49f3-aa9c-2f80256772c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "c9685031-afce-40c7-911f-e6f577c46c2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/934", "content": "Tools - Hackers Factory \n\nThis a adaption of tomnomnom's kxss tool with a different output format.\n\nhttps://github.com/Emoe/kxss\n\nIdentify and extract files from container formats using.\n\nhttps://github.com/Vector35/blob_extractor\n\n(CVE-2024-46740)[binder ]fix UAF caused by offsets overwrite\n\nhttps://github.com/torvalds/linux/commit/4df153652cc46545722879415937582028c18af5\n\nSmall tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file \n\nhttps://github.com/mandatoryprogrammer/xsshunter-express/blob/main/probe.js#L197 \n\nDump Kerberos tickets from the KCM database of SSSD.\n\nhttps://github.com/synacktiv/kcmdump\n\nGenerate AES128 and AES256 Kerberos keys from a given username, password, and realm\n\nhttps://github.com/seriotonctf/kerberos_aes_key\n\nConfuserEx2 String Decryptor &amp; Full Deobfuscation Guide\n\nhttps://github.com/Dump-GUY/ConfuserEx2_String_Decryptor\n\nConverted and added a C BOF version of \n\nhttps://github.com/rotarydrone/GlobalUnProtect to the TrustedSec BOF repo at \n\nhttps://github.com/trustedsec/CS-Remote-OPs-BOF/tree/main\n\nSubOwner - A Simple tool check for subdomain takeovers\n\nhttps://github.com/ifconfig-me/subowner\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-21T11:27:17.000000Z"}, {"uuid": "247cdfab-7b74-4cfd-96d6-9b3b1c3515a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8781", "content": "Tools - Hackers Factory \n\nThis a adaption of tomnomnom's kxss tool with a different output format.\n\nhttps://github.com/Emoe/kxss\n\nIdentify and extract files from container formats using.\n\nhttps://github.com/Vector35/blob_extractor\n\n(CVE-2024-46740)[binder ]fix UAF caused by offsets overwrite\n\nhttps://github.com/torvalds/linux/commit/4df153652cc46545722879415937582028c18af5\n\nSmall tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file \n\nhttps://github.com/mandatoryprogrammer/xsshunter-express/blob/main/probe.js#L197 \n\nDump Kerberos tickets from the KCM database of SSSD.\n\nhttps://github.com/synacktiv/kcmdump\n\nGenerate AES128 and AES256 Kerberos keys from a given username, password, and realm\n\nhttps://github.com/seriotonctf/kerberos_aes_key\n\nConfuserEx2 String Decryptor &amp; Full Deobfuscation Guide\n\nhttps://github.com/Dump-GUY/ConfuserEx2_String_Decryptor\n\nConverted and added a C BOF version of \n\nhttps://github.com/rotarydrone/GlobalUnProtect to the TrustedSec BOF repo at \n\nhttps://github.com/trustedsec/CS-Remote-OPs-BOF/tree/main\n\nSubOwner - A Simple tool check for subdomain takeovers\n\nhttps://github.com/ifconfig-me/subowner\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-21T10:52:16.000000Z"}, {"uuid": "d6fd0ceb-84f9-4e9c-9036-d791ec9b90a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46740", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7442", "content": "Tools - Hackers Factory \n\nThis a adaption of tomnomnom's kxss tool with a different output format.\n\nhttps://github.com/Emoe/kxss\n\nIdentify and extract files from container formats using.\n\nhttps://github.com/Vector35/blob_extractor\n\n(CVE-2024-46740)[binder ]fix UAF caused by offsets overwrite\n\nhttps://github.com/torvalds/linux/commit/4df153652cc46545722879415937582028c18af5\n\nSmall tip for those who use xsshunter express as their blind xss framework: If you want to use import() function for your payloads (which is pretty good for some filter bypasses), you need to change the line 197 of probe.js file \n\nhttps://github.com/mandatoryprogrammer/xsshunter-express/blob/main/probe.js#L197 \n\nDump Kerberos tickets from the KCM database of SSSD.\n\nhttps://github.com/synacktiv/kcmdump\n\nGenerate AES128 and AES256 Kerberos keys from a given username, password, and realm\n\nhttps://github.com/seriotonctf/kerberos_aes_key\n\nConfuserEx2 String Decryptor &amp; Full Deobfuscation Guide\n\nhttps://github.com/Dump-GUY/ConfuserEx2_String_Decryptor\n\nConverted and added a C BOF version of \n\nhttps://github.com/rotarydrone/GlobalUnProtect to the TrustedSec BOF repo at \n\nhttps://github.com/trustedsec/CS-Remote-OPs-BOF/tree/main\n\nSubOwner - A Simple tool check for subdomain takeovers\n\nhttps://github.com/ifconfig-me/subowner\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-21T10:52:16.000000Z"}]}