{"uuid": "5d72b567-5f19-4dfe-8a59-9dbf95cc5164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24092", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3053", "content": "\u0432\u043e\u0442 \u043d\u0435\u043e\u0442\u0441\u043e\u0440\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043f\u043e\u0434\u0431\u043e\u0440\u043a\u0430 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0440\u0438\u0441\u0435\u0440\u0447\u0435\u0439 \u0438 \u0441\u0442\u0430\u0442\u0435\u0439 \u043f\u043e \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u043c \nhttps://www.usenix.org/system/files/conference/woot16/woot16-paper-blackthorne_update.pdf\nhttps://www.sentinelone.com/labs/cve-2021-24092-12-years-in-hiding-a-privilege-escalation-vulnerability-in-windows-defender/\nhttps://habr.com/ru/company/skillfactory/blog/527512/\nhttps://landave.io/2020/11/bitdefender-upx-unpacking-featuring-ten-memory-corruptions/\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2018\nhttps://palant.info/2020/06/22/exploiting-bitdefender-antivirus-rce-from-any-website/\nhttps://www.accenture.com/us-en/blogs/cyber-defense/exploiting-arbitrary-file-move-in-symantec-endpoint-protection\nhttps://n4r1b.netlify.com/posts/2020/03/dissecting-the-windows-defender-driver-wdfilter-part-3/\nhttps://medium.com/s2wblog/fuzzing-the-shield-cve-2022-24548-96f568980c0", "creation_timestamp": "2023-04-28T05:52:17.000000Z"}