{"vulnerability": "cve-2024-4419", "sightings": [{"uuid": "5e69b963-c8b7-4482-84c1-6eb6ba672e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}, {"uuid": "3585f238-af39-47a6-b98a-542a1f5c7831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/cvedetector/6833", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44193 - iTunes Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-44193 \nPublished : Oct. 2, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : A logic issue was addressed with improved restrictions. This issue is fixed in iTunes 12.13.3 for Windows. A local attacker may be able to elevate  their privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-02T18:02:02.000000Z"}, {"uuid": "1a42841d-9097-48b5-b173-34a3cdb50f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8979", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}, {"uuid": "c9c79e0a-0dc4-42d2-99d6-f39e5a2b4329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8866", "content": "Tools - Hackers Factory \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-09T12:58:37.000000Z"}, {"uuid": "7e347e7d-4593-4195-95f1-d2e15ea86084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3873", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:33:05.000000Z"}, {"uuid": "d553cc6f-6711-4e66-b1f8-c86d7428b5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7604", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}, {"uuid": "70b9ff8c-2d93-4be1-b345-02a56e564748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7502", "content": "Tools - Hackers Factory \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-09T12:58:37.000000Z"}, {"uuid": "fc39ce07-b9d2-44e0-8edb-3369ce05b775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3718", "content": "https://github.com/mbog14/CVE-2024-44193\n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day", "creation_timestamp": "2024-10-07T10:19:48.000000Z"}, {"uuid": "3d9f4ae7-acaf-441a-b49b-536ac94afac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/26007", "content": "\u26a1\ufe0fPoC Exploit Releases for CVE-2024-44193: Local Privilege Escalation Vulnerability in iTunes.\n\n#CyberBulletin", "creation_timestamp": "2024-10-07T13:16:03.000000Z"}, {"uuid": "cad6cebd-3841-41c5-8ed8-3e2777bef8f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3325", "content": "https://github.com/mbog14/CVE-2024-44193\n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n#github #\u5206\u6790", "creation_timestamp": "2024-10-17T11:38:41.000000Z"}, {"uuid": "56711043-3de4-4716-bd4f-3b7cff437d49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11290", "content": "#exploit\n1. CVE-2024-35250:\nWindows 11 Kernel-Mode Driver EoP/LPE\nhttps://github.com/varwara/CVE-2024-35250\n\n2. CVE-2024-44193:\niTunes for Windows - LPE\nhttps://github.com/mbog14/CVE-2024-44193\n\n3. CVE-2024-9464:\nPalo Alto Expedition Authenticated CI\nhttps://github.com/horizon3ai/CVE-2024-9464", "creation_timestamp": "2024-10-16T22:23:49.000000Z"}, {"uuid": "b98ecb71-50a8-4049-b929-df7cbce3af84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/636", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:09.000000Z"}, {"uuid": "5fe96c62-9ee3-497b-ae24-87a203b5616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miltud3din2f", "content": "", "creation_timestamp": "2026-04-03T13:40:09.436657Z"}, {"uuid": "c00fec96-9974-4add-b9f3-a9afd281dde6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8310", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory.\n\ud83d\udccf Published: 2025-03-20T23:53:44.753Z\n\ud83d\udccf Modified: 2025-03-20T23:53:44.753Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120911", "creation_timestamp": "2025-03-21T00:23:15.000000Z"}, {"uuid": "9a866b13-f355-4034-9826-cd49e30525a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13726", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Hacking Windows through iTunes\u200a - Local Privilege Escalation Zero-Day.\n\nhttps://github.com/mbog14/CVE-2024-44193", "creation_timestamp": "2024-10-07T09:09:49.000000Z"}, {"uuid": "7896a6bb-14fa-4066-8497-dd7656aaf783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4419", "type": "seen", "source": "Telegram/401Wy0nZ3Sg4i1lxeYt5haVHNnFVZjvSVEBkJtQW4Z-bnZLp", "content": "", "creation_timestamp": "2024-06-15T14:50:37.000000Z"}, {"uuid": "3860944f-a63a-4105-b0f9-110bab29a1e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44198", "type": "seen", "source": "https://t.me/cvedetector/5776", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44198 - Apple VisionOS Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44198 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : An integer overflow was addressed through improved input validation. This issue is fixed in visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:20.000000Z"}, {"uuid": "1a57a51b-0579-4359-8e57-e8497ec7370c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44191", "type": "seen", "source": "https://t.me/cvedetector/5775", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44191 - Apple iOS Bluetooth State Management Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44191 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : This issue was addressed through improved state management. This issue is fixed in iOS 17.7 and iPadOS 17.7, Xcode 16, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. An app may gain unauthorized access to Bluetooth. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:19.000000Z"}, {"uuid": "50778b33-6157-4b3b-a841-b58be007bccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44190", "type": "seen", "source": "https://t.me/cvedetector/5773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44190 - macOS Arbitrary File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44190 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:18.000000Z"}, {"uuid": "c20edbe1-027c-48da-b97a-f70c4ba8fbe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/1097", "content": "\u26a1\ufe0fPoC Exploit Releases for CVE-2024-44193: Local Privilege Escalation Vulnerability in iTunes.\n\n#CyberBulletin", "creation_timestamp": "2024-10-07T13:16:03.000000Z"}, {"uuid": "71692a84-3f14-451d-bd85-a23500c70236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1172", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:33:05.000000Z"}, {"uuid": "1549da6c-6446-4ce0-b2fd-dc8e0571b61a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1043", "content": "Tools - Hackers Factory \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-09T12:58:32.000000Z"}, {"uuid": "1e0ec99c-1906-46f3-8dbb-8fe77cb68f58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24047", "content": "Tools - Hackers Factory \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-09T12:58:42.000000Z"}, {"uuid": "4325d26b-136f-4e7e-9302-84ed3a507fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/Unik4tsG4ng/9801", "content": "Tools \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom", "creation_timestamp": "2024-10-25T04:26:57.000000Z"}, {"uuid": "733b7983-b587-4f32-821f-2c5f6d187d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113683192678311764", "content": "", "creation_timestamp": "2024-12-20T04:10:57.512211Z"}, {"uuid": "726bb305-a70f-4ef9-bb47-835bd0d82640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldpjmmsnx42m", "content": "", "creation_timestamp": "2024-12-20T04:15:22.534792Z"}, {"uuid": "6ff71451-0e3a-474b-a013-5485a927878d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44192", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44192\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.\n\ud83d\udccf Published: 2025-03-10T19:11:09.176Z\n\ud83d\udccf Modified: 2025-03-10T19:11:09.176Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121238\n2. https://support.apple.com/en-us/121248\n3. https://support.apple.com/en-us/121249\n4. https://support.apple.com/en-us/121250\n5. https://support.apple.com/en-us/121240\n6. https://support.apple.com/en-us/121241", "creation_timestamp": "2025-03-10T19:38:27.000000Z"}, {"uuid": "438a390d-c1cc-455a-a4bc-eb729cd5cc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/cvedetector/20785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44199 - Apple macOS out-of-bounds read vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44199 \nPublished : March 21, 2025, 12:15 a.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T04:16:34.000000Z"}, {"uuid": "95e8f954-f574-4dbe-bd04-3e960c7549fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://t.me/cvedetector/13403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44195 - \"macOS Sequoia File Path Manipulation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-44195 \nPublished : Dec. 20, 2024, 4:15 a.m. | 33\u00a0minutes ago \nDescription : A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T05:52:24.000000Z"}, {"uuid": "0874176c-6db8-445f-839d-d5e7bde5ad2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15379", "content": "\u200aPoC Exploit Releases for CVE-2024-44193: Local Privilege Escalation Vulnerability in iTunes\n\nhttps://securityonline.info/poc-exploit-releases-for-cve-2024-44193-local-privilege-escalation-vulnerability-in-itunes/", "creation_timestamp": "2024-10-08T03:27:20.000000Z"}, {"uuid": "f560e872-40ba-4339-aa4c-28353ab0bb76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24289", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:09.000000Z"}, {"uuid": "464de762-2bdc-438f-89ba-7ea558e2489e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3784", "content": "Tools - Hackers Factory \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-09T12:58:50.000000Z"}, {"uuid": "b3e58011-bc83-4c27-9085-a05dda5cb5c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9206", "content": "GitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193", "creation_timestamp": "2024-10-07T22:41:28.000000Z"}, {"uuid": "c74b3ce1-de76-49d1-9241-c6715216657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}, {"uuid": "4c8cae5c-16d9-4bd0-a3eb-2294f312aaff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/478", "content": "Tools - Hackers Factory \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-09T12:58:42.000000Z"}, {"uuid": "ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkuand4kiz2x", "content": "", "creation_timestamp": "2025-03-21T03:14:22.300439Z"}, {"uuid": "f4d92273-326f-401c-9434-d3b0bbce1c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:28.000000Z"}]}