{"uuid": "e8a47d68-e581-43d5-ab06-24f87ac69af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1823", "content": "\ud83d\udd25Win32k User-Mode Printer Drivers StartDoc UAF\n(PoC included)\n\nA vulnerability(CVE-2022-41050) in the way BoundClipRGNToSurface merges surfaces allows attackers to trigger a UAF due to a function that frees the used data and then access it. If the memory where the freed memory is properly prepared, the attacker can control the crash and cause it to execute arbitrary code.", "creation_timestamp": "2022-12-17T05:04:49.000000Z"}