{"vulnerability": "CVE-2022-2197", "sightings": [{"uuid": "ed62c3ab-15f9-4cbe-8e8c-2020d7d9a323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "58f640bb-aa95-42d4-8164-3b76bcdbc3c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971681", "content": "", "creation_timestamp": "2024-12-24T20:32:44.622775Z"}, {"uuid": "308fd2cd-4222-4abf-85e3-8e4682e4fc60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}, {"uuid": "6761df3f-b22d-4a49-8b70-81fbc665dc4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21974", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:08.000000Z"}, {"uuid": "b85d78ca-f5d4-4c28-b98f-2fb667822b45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21974", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:48.000000Z"}, {"uuid": "fe870fad-2cd4-4999-9cb1-8d8051f9efa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:10.000000Z"}, {"uuid": "c4dd7480-1b30-4a2c-a790-5a77936fdd4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:25.000000Z"}, {"uuid": "fac67bb6-df42-45e5-85a9-2da831844281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-21972", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=801", "content": "", "creation_timestamp": "2022-05-11T04:00:00.000000Z"}, {"uuid": "d83fd2bc-3baf-4db6-80b3-24c8ca1809cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21971", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/86666d31-3f2c-432c-b3ae-61cbf57419fb", "content": "", "creation_timestamp": "2026-02-02T12:27:17.472557Z"}, {"uuid": "8940f995-0eee-44f4-8c93-7a6377b375ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8884", "content": "CVE-2022-21971: Uninitialized pointer free in prauthproviders.\n\nhttps://github.com/0vercl0k/CVE-2022-21971", "creation_timestamp": "2022-02-27T18:50:08.000000Z"}, {"uuid": "0a9ffb30-b0e7-4424-b2e0-9086cd4b47ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21972", "type": "published-proof-of-concept", "source": "https://t.me/cKure/9504", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2022-21972: Windows Server VPN Remote Kernel Use After Free Vulnerability \n\nhttps://labs.nettitude.com/blog/cve-2022-21972-windows-server-vpn-remote-kernel-use-after-free-vulnerability/", "creation_timestamp": "2022-05-12T00:17:38.000000Z"}, {"uuid": "794683c9-54d4-4a40-a920-c06f14c14069", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/723", "content": "\ud83d\udca5Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2022-21970). This vulnerability allows an attacker to execute javascript code on every host without permission, also an attacker can steal local system files, and also he can manipulate the actions against the machine and result in changing internal developer settings in Microsoft Edge.", "creation_timestamp": "2024-08-12T09:20:51.000000Z"}, {"uuid": "a2ea2675-1aed-4bee-9e0c-e76331903614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21974", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1546", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPoC for CVE-2022-21974 \\\"Roaming Security Rights Management Services Remote Code Execution Vulnerability\\\"\nURL\uff1ahttps://github.com/0vercl0k/CVE-2022-21974", "creation_timestamp": "2022-02-26T20:50:38.000000Z"}, {"uuid": "5e4336f7-e028-4b6f-b6ce-503b2a9cccce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1547", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPoC for CVE-2022-21971 \\\"Windows Runtime Remote Code Execution Vulnerability\\\"\nURL\uff1ahttps://github.com/0vercl0k/CVE-2022-21971", "creation_timestamp": "2022-02-26T20:54:47.000000Z"}, {"uuid": "6c00e8eb-a6a8-4f53-bf32-527efb192cc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/ckuRED/102", "content": "CVE-2022-21971: Uninitialized pointer free in prauthproviders.\n\nhttps://github.com/0vercl0k/CVE-2022-21971", "creation_timestamp": "2022-02-27T18:49:50.000000Z"}, {"uuid": "6e1f5311-77b8-460a-ad86-c6f177344f5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1378", "content": "CVE-2022-21971: \u041d\u0435\u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c \u0441\u0432\u043e\u0431\u043e\u0434\u0435\u043d \u0432 prauthproviders\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-04-24T05:00:36.000000Z"}, {"uuid": "621c1f5a-6d74-4289-8069-3aec4d565281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1122", "content": "\u200bCVE-2022-21971\nRCE \u0432 Windows\n\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b:\n\u25ab\ufe0f Windows 10\n\u25ab\ufe0f Windows 11\n\u25ab\ufe0f Win Server 19\n\u25ab\ufe0f Win Server 22\n\nPOC:\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1\ufe0f", "creation_timestamp": "2022-03-23T07:13:11.000000Z"}, {"uuid": "5e1594e3-9f55-433a-ada7-a26fe486bbad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "exploited", "source": "https://t.me/poxek/2362", "content": "#\u041f\u041e  #CVE\n\nCISA \u043f\u0440\u043e\u0441\u0438\u0442 \u0432\u0430\u0441 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u044d\u0442\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\nCVE-2022-22536, CVE-2022-32893, CVE-2022-32894, CVE-2022-2856, CVE-2022-21971, CVE-2022-26923, CVE-2017-15944\n\nCISA (\u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u043e \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0421\u0428\u0410) \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u043e \u0441\u0432\u043e\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u043e\u0431\u0430\u0432\u0438\u0432 \u0432 \u043d\u0435\u0433\u043e \u0441\u0435\u043c\u044c \u043d\u043e\u0432\u044b\u0445 \u043f\u043e\u0437\u0438\u0446\u0438\u0439. \u042d\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Apple, Google, Microsoft, Palo Alto Networks \u0438 SAP.\u00a0", "creation_timestamp": "2022-08-25T18:06:49.000000Z"}, {"uuid": "12c99af5-7a25-4ce5-9498-ea673c551d4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1912", "content": "CVE-2022-21971: Uninitialized pointer free in prauthproviders\nPoC CVE-2022-21971\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-07-05T09:01:59.000000Z"}, {"uuid": "39a7482e-61fb-402f-bff0-9171fd5a880d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "https://t.me/poxek/2332", "content": "#Windows #CVE #POC\n\nWindows Runtime Remote Code Execution Vulnerability\nCVE-2022-21971", "creation_timestamp": "2022-08-22T20:50:01.000000Z"}, {"uuid": "e379349a-68f4-4ee4-927e-0f82449d3f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/JWItrsCY8Nbfg1Bc1Is8JbRDl_l_krWtbFHYHVllCU9q0Q", "content": "", "creation_timestamp": "2023-12-30T09:17:27.000000Z"}, {"uuid": "a7567807-9078-4a7e-885e-5ac88eb7fca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/apPplaF6PmdjRCn_DMoOFIR72yrQoFHcCyHiFRbnLeojjA", "content": "", "creation_timestamp": "2023-12-23T01:38:13.000000Z"}, {"uuid": "21d089a9-66b6-43fd-bc93-5b1179493afc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "https://t.me/cyberbannews_ir/6477", "content": "\u200d \ud83d\uded1\u0627\u0641\u0632\u0648\u062f\u0647 \u0634\u062f\u0646 7 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u0628\u0647 \u0641\u0647\u0631\u0633\u062a \u0628\u0627\u06af \u0647\u0627\u06cc CISA\n\n\u0622\u0698\u0627\u0646\u0633 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0648 \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0622\u0645\u0631\u06cc\u06a9\u0627 \u06cc\u0627 \u0647\u0645\u0627\u0646 \u0633\u06cc\u0633\u0627 7 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u0628\u0647 \u0641\u0647\u0631\u0633\u062a \u0628\u0627\u06af \u0647\u0627\u06cc \u062a\u062d\u062a \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u062e\u0648\u062f \u0627\u0641\u0632\u0648\u062f\u0647 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u062c\u062f\u06cc\u062f \u062a\u0648\u0633\u0637 \u0627\u067e\u0644\u060c \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\u060c \u0627\u0633 \u0627\u0650\u06cc \u067e\u06cc \u0648 \u06af\u0648\u06af\u0644 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0646\u062f.\n\n\u0628\u0627 \u0627\u062d\u062a\u0633\u0627\u0628 \u0627\u06cc\u0646 7 \u0645\u0648\u0631\u062f \u062c\u062f\u06cc\u062f\u060c \u0641\u0647\u0631\u0633\u062a \u0628\u0627\u06af \u0647\u0627\u06cc \u0633\u06cc\u0633\u0627 \u062d\u0627\u0644\u0627 \u0634\u0627\u0645\u0644 801 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0622\u0698\u0627\u0646\u0633 \u0647\u0627\u06cc \u0641\u062f\u0631\u0627\u0644 \u0628\u0627\u06cc\u0633\u062a\u06cc \u0637\u0628\u0642 \u062a\u0627\u0631\u06cc\u062e \u0647\u0627\u06cc \u062a\u0639\u06cc\u06cc\u0646 \u0634\u062f\u0647\u060c \u0622\u0646 \u0647\u0627 \u0631\u0627 \u0627\u0635\u0644\u0627\u062d \u06a9\u0646\u0646\u062f. \n\n\u0633\u06cc\u0633\u0627 \u0627\u0632 \u062a\u0645\u0627\u0645\u06cc \u0622\u0698\u0627\u0646\u0633 \u0647\u0627\u06cc \u0641\u062f\u0631\u0627\u0644 \u0648 \u0634\u0631\u06a9\u062a \u0647\u0627\u06cc \u0645\u0631\u0628\u0648\u0637\u0647 \u062e\u0648\u0627\u0633\u062a\u0647\u060c \u062a\u0627 \u062a\u0627\u0631\u06cc\u062e 8 \u0633\u067e\u062a\u0627\u0645\u0628\u0631 2022 \u0627\u06cc\u0646 7 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u0631\u0627 \u0627\u0635\u0644\u0627\u062d \u06a9\u0646\u0646\u062f:\n\nCVE-2017-15944: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0634\u0631\u06a9\u062a \u067e\u0627\u0644\u0648 \u0622\u0644\u062a\u0648\nCVE-2022-21971: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\nCVE-2022-26923: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a\nCVE-2022-2856: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u06af\u0648\u06af\u0644\nCVE-2022-32893: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u067e\u0644\nCVE-2022-32894: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u067e\u0644\nCVE-2022-22536: \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0634\u0631\u06a9\u062a SAP\n\u0647\u0646\u0648\u0632 \u0647\u06cc\u0686 \u062c\u0632\u0626\u06cc\u0627\u062a\u06cc \u062f\u0631 \u0627\u0631\u062a\u0628\u0627\u0637 \u0628\u0627 \u0646\u062d\u0648\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0628\u0627\u0632\u06cc\u06af\u0631\u0627\u0646 \u0645\u062e\u0631\u0628 \u0627\u0632 \u0622\u0646 \u0647\u0627 \u0645\u0646\u062a\u0634\u0631 \u0646\u0634\u062f\u0647 \u0627\u0633\u062a. \n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc\n\n@cyberbannews_ir", "creation_timestamp": "2022-08-20T10:09:16.000000Z"}, {"uuid": "7963671a-b344-46ec-a54e-a12c9284d9a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/Blackhat_Officials/1355", "content": "\ud83d\udca5Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2022-21970). This vulnerability allows an attacker to execute javascript code on every host without permission, also an attacker can steal local system files, and also he can manipulate the actions against the machine and result in changing internal developer settings in Microsoft Edge.", "creation_timestamp": "2024-08-12T09:21:05.000000Z"}, {"uuid": "eaf11f64-31f7-4bbd-a4df-688aa1e8b702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/1f4j6NSN7glSGrSxtBBnMTbW4t4OnDyRfm9WlUAn0ZA", "content": "", "creation_timestamp": "2024-08-12T11:40:41.000000Z"}, {"uuid": "8d0e0947-44bc-4978-b4f5-d35e3b757e70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "Telegram/If4NZk_Zycy_oVqNsOZyb6MaDTEnQVuDEGCcmMOohhJ5zP-d", "content": "", "creation_timestamp": "2025-01-30T02:17:48.000000Z"}, {"uuid": "0d63e811-9679-4032-9df6-509b9fbf708b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/1550", "content": "\ud83d\udca5Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2022-21970). This vulnerability allows an attacker to execute javascript code on every host without permission, also an attacker can steal local system files, and also he can manipulate the actions against the machine and result in changing internal developer settings in Microsoft Edge.", "creation_timestamp": "2024-08-12T09:18:00.000000Z"}, {"uuid": "825906cc-12e8-4bd1-aabf-aee449b6eae2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "https://t.me/arpsyndicate/1434", "content": "#ExploitObserverAlert\n\nCVE-2022-21971\n\nDESCRIPTION: Exploit Observer has 16 entries related to CVE-2022-21971. Windows Runtime Remote Code Execution Vulnerability\n\nFIRST-EPSS: 0.499470000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-05T08:37:33.000000Z"}, {"uuid": "55e327f3-ca7f-47f0-8d6e-5cee04eac289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/ARC15INFO/586", "content": "CVE-2022-21971:  Windows Runtime RCE\n\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n#git #exploit #pentest", "creation_timestamp": "2024-08-29T06:27:46.000000Z"}, {"uuid": "1426ff41-2afa-43cb-9edc-5b4839fb2834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/668", "content": "00: \u0421\u0432\u0435\u0436\u0430\u044f RCE \u0432 Windows \ud83c\udf83\ud83c\udf83\ud83c\udf83\n01: CVE-2022-21971\n02: \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b:\n\u2014- windows10\n\u2014-windows 11\n\u2014-win srv 19\n\u2014-win srv 22\nPOC exploit \u0443\u0436\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442\n\ud83d\ude0e\ud83d\ude0e\ud83d\ude0e", "creation_timestamp": "2022-02-27T09:16:05.000000Z"}, {"uuid": "3a3d14fa-8a4b-4535-9ec3-f51a09a89eb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21972", "type": "published-proof-of-concept", "source": "Telegram/GHP0Tww4HxpHIaZA2nkY_jMfQqgyq5ipFBQcOFoNgLqfdw", "content": "", "creation_timestamp": "2022-05-12T13:13:30.000000Z"}, {"uuid": "b74b1ac0-93eb-46c2-a6b6-f07b8e9c5c64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1180", "content": "CVE-2022-21971:  Windows Runtime RCE\n\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n#git #exploit #pentest", "creation_timestamp": "2022-05-31T08:01:56.000000Z"}, {"uuid": "242f8494-87df-4b2b-a674-7fe43935ae70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/Upo_magJq4oGdlmm3xawAx9czER3GnXZV14FHmP4UTm3V6A", "content": "", "creation_timestamp": "2022-10-24T09:44:59.000000Z"}, {"uuid": "4dcb608c-dde5-4a46-8007-746ffafdc70d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21972", "type": "seen", "source": "https://t.me/cibsecurity/42281", "content": "\u203c CVE-2022-23270 \u203c\n\nPoint-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21972.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:33:10.000000Z"}, {"uuid": "f2c501f2-152e-4acd-882f-39f0278b9039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2197", "type": "seen", "source": "https://t.me/cibsecurity/45434", "content": "\u203c CVE-2022-2197 \u203c\n\nBy using a specific credential string, an attacker with network access to the device\u00e2\u20ac\u2122s web interface could circumvent the authentication scheme and perform administrative operations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T22:38:50.000000Z"}, {"uuid": "32fbeb7a-abaa-4da9-80dc-9cb292b4dd42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21978", "type": "seen", "source": "https://t.me/cibsecurity/42300", "content": "\u203c CVE-2022-21978 \u203c\n\nMicrosoft Exchange Server Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T23:59:40.000000Z"}, {"uuid": "8ba1abac-7571-477d-b5ea-35ff464e4c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21977", "type": "seen", "source": "https://t.me/cibsecurity/38606", "content": "\u203c CVE-2022-21977 \u203c\n\nMedia Foundation Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22010.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:18:10.000000Z"}, {"uuid": "805135e6-9268-40b1-b11d-7117330bc1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21973", "type": "seen", "source": "https://t.me/cibsecurity/38597", "content": "\u203c CVE-2022-21973 \u203c\n\nWindows Media Center Update Denial of Service Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-09T20:17:59.000000Z"}, {"uuid": "24a350a3-0d0c-4343-914a-a767f13faea5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21974", "type": "seen", "source": "https://t.me/cibsecurity/37101", "content": "\u203c CVE-2022-21974 \u203c\n\nRoaming Security Rights Management Services Remote Code Execution Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-09T20:13:28.000000Z"}, {"uuid": "87a0c8b0-5be9-4457-b034-95ac8a739c4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/1383", "content": "CVE-2022-21971:  Windows Runtime RCE\n\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n#git #exploit #pentest", "creation_timestamp": "2022-02-27T12:02:17.000000Z"}, {"uuid": "1dbf1d7b-50c8-48ab-bba7-edc3bea965dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "seen", "source": "https://t.me/thehackernews/2494", "content": "CISA has updated its Known Exploited Vulnerabilities Catalog with 7 new vulnerabilities based on evidence of active exploitation.\n\nRead details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html\n\nCVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536", "creation_timestamp": "2022-08-23T14:49:44.000000Z"}, {"uuid": "efa378c6-74f1-47f7-a54e-6b5a1679ea5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1760", "content": "#exploit\n1. CVE-2022-21974:\nRoaming Security Rights Management Services\nRemote Code Execution Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21974\n\n2. CVE-2022-21971:\nWindows Runtime RCE Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n@BlueRedTeam", "creation_timestamp": "2022-02-27T09:00:09.000000Z"}, {"uuid": "c313d1ff-724e-4d8f-bfdc-a3b79203d025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21974", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1760", "content": "#exploit\n1. CVE-2022-21974:\nRoaming Security Rights Management Services\nRemote Code Execution Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21974\n\n2. CVE-2022-21971:\nWindows Runtime RCE Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21971\n\n@BlueRedTeam", "creation_timestamp": "2022-02-27T09:00:09.000000Z"}, {"uuid": "d2a5dfc7-1b3b-4598-8cba-8f22f0db7a25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5501", "content": "#exploit\n1. CVE-2022-21974:\nRoaming Security Rights Management Services RCE Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21974\n\n2. CVE-2022-21971:\nWindows Runtime RCE Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21971", "creation_timestamp": "2023-10-27T02:40:43.000000Z"}, {"uuid": "1aba36c0-39e2-4889-a406-bf654e211488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21974", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5501", "content": "#exploit\n1. CVE-2022-21974:\nRoaming Security Rights Management Services RCE Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21974\n\n2. CVE-2022-21971:\nWindows Runtime RCE Vulnerability\nhttps://github.com/0vercl0k/CVE-2022-21971", "creation_timestamp": "2023-10-27T02:40:43.000000Z"}, {"uuid": "fad657d2-2b78-4ca5-94b6-4733e4286bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7034", "content": "#exploit\n1. CVE-2022-36663:\nInternal network scanner through Gluu IAM blind ssrf\nhttps://github.com/Qeisi/CVE-2022-36663-PoC\n\n2. CVE-2022-21970:\nMicrosoft Edge (Chromium-based) EoP Vulnerability\nhttps://github.com/Malwareman007/CVE-2022-21970\n\n3. CVE-2022-39197:\nCobaltStrike &lt;= 4.7.1 RCE\nhttps://github.com/TheCryingGame/CVE-2022-39197-RCE", "creation_timestamp": "2022-10-23T19:30:28.000000Z"}, {"uuid": "6696b3b7-c92f-4b40-9416-3a977fc12d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21971", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/3351", "content": "CVE-2022-21971:  Windows Runtime RCE\n\nGithub\n\n#exploit \n\u2014\u2014\u2014\u2014\u2014\u2014\u2067\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-02-27T18:08:20.000000Z"}]}