{"vulnerability": "CVE-2021-33739", "sightings": [{"uuid": "b7619a39-20b3-4e13-b073-a2e6820a5d74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "60a1ac31-92cd-489e-862c-e4d0eced465d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "82169730-b70e-4ee2-a357-17e3282b754a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "MISP/614dca03-d7e8-4ff3-b09a-8db466b74b35", "content": "", "creation_timestamp": "2024-11-14T06:09:05.000000Z"}, {"uuid": "22b00085-7c34-4540-b5e8-eda63ebab8ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971042", "content": "", "creation_timestamp": "2024-12-24T20:23:27.090348Z"}, {"uuid": "6e1e1e72-4e7f-42bf-8e29-70d079d9a985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:56.000000Z"}, {"uuid": "75c5809b-3b0f-4e0e-b9c7-c12711755d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:00:56.000000Z"}, {"uuid": "c5cba151-2d98-4251-a623-57ef968c1502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/585", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-33739 PoC Analysis\nURL\uff1ahttps://github.com/giwon9977/CVE-2021-33739_PoC", "creation_timestamp": "2021-09-24T03:37:01.000000Z"}, {"uuid": "60322753-ed4d-4091-93e6-338cc9334337", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=593", "content": "", "creation_timestamp": "2021-06-09T04:00:00.000000Z"}, {"uuid": "d46d14e3-0079-4e0c-8f6e-370bd8ef1c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-33739", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/b51aa925-7438-444b-b0f8-405aba260e3e", "content": "", "creation_timestamp": "2026-02-02T12:28:49.109478Z"}, {"uuid": "cfeead93-1799-4cde-a5ea-b3894ae59d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3581", "content": "#exploit \nCVE-2021-26868 LPE,\nCVE-2021-33739 EoP in Windows Graphics Component/Desktop Window Manager\nhttps://github.com/mavillon1/CVE-2021-33739-POC", "creation_timestamp": "2024-10-09T17:36:09.000000Z"}, {"uuid": "da5c2baf-0c7c-4213-82c4-2ee049c5fbf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "Telegram/qO0N6oPhT540AWXj1upCs9Gz1avB-CrnJkIHg0gMDosBpiUf", "content": "", "creation_timestamp": "2025-03-08T04:36:10.000000Z"}, {"uuid": "94e46fce-309b-4c16-9d04-19bd62006f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "https://t.me/alexmakus/4121", "content": "\u0411\u043e\u043b\u044c\u0448\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Microsoft Windows, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 6 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f (\u043d\u0443, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043a \u043d\u0438\u043c, \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u0436\u0435)\n\n\u2013CVE-2021-33742, a remote code execution bug in a Windows HTML component.\n\u2013CVE-2021-31955, an information disclosure bug in the Windows Kernel\n\u2013CVE-2021-31956, an elevation of privilege flaw in Windows NTFS\n\u2013CVE-2021-33739, an elevation of privilege flaw in the Microsoft Desktop Window Manager\n\u2013CVE-2021-31201, an elevation of privilege flaw in the Microsoft Enhanced Cryptographic Provider\n\u2013CVE-2021-31199, an elevation of privilege flaw in the Microsoft Enhanced Cryptographic Provider\n\nhttps://krebsonsecurity.com/2021/06/microsoft-patches-six-zero-day-security-holes/", "creation_timestamp": "2021-06-09T04:51:08.000000Z"}, {"uuid": "b5a14688-ac56-4105-9237-3b8b6ed8590a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33739", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3732", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (June 1-30)\nCVE-2021-1675 - Windows Print Spooler EoP\nhttps://t.me/cybersecuritytechnologies/3723\nCVE-2021-21985 - vSphere Client RCE\nhttps://t.me/cybersecuritytechnologies/3493\nCVE-2021-3560 - Privilege escalation with polkit\nhttps://t.me/cybersecuritytechnologies/3587\nCVE-2021-28476 - Hyper-V RCE in vmswitch.sys\nhttps://t.me/cybersecuritytechnologies/3514\nCVE-2020-3580 - XSS in Cisco ASA\nhttps://www.helpnetsecurity.com/2021/06/29/cve-2020-3580-exploit\nCVE-2021-31955/31956 - Windows NTFS EoP/Kernel Information Disclosure\nhttps://github.com/mavillon1/CVE-2021-31955-POC\nhttps://t.me/cybersecuritytechnologies/3705\nCVE-2021-33739 - MS DWM Core Library EoP\nhttps://t.me/cybersecuritytechnologies/3581\nCVE-2021-27850 - Apache Tapestry RCE\nhttps://t.me/cybersecuritytechnologies/3694\nCVE-2020-36289 - Atlassian Jira Unauth User Enum\nhttps://mobile.twitter.com/i/web/status/1402644004781633540", "creation_timestamp": "2021-07-01T11:03:01.000000Z"}]}