{"vulnerability": "CVE-2022-21970", "sightings": [{"uuid": "7963671a-b344-46ec-a54e-a12c9284d9a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/Blackhat_Officials/1355", "content": "\ud83d\udca5Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2022-21970). This vulnerability allows an attacker to execute javascript code on every host without permission, also an attacker can steal local system files, and also he can manipulate the actions against the machine and result in changing internal developer settings in Microsoft Edge.", "creation_timestamp": "2024-08-12T09:21:05.000000Z"}, {"uuid": "794683c9-54d4-4a40-a920-c06f14c14069", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/723", "content": "\ud83d\udca5Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2022-21970). This vulnerability allows an attacker to execute javascript code on every host without permission, also an attacker can steal local system files, and also he can manipulate the actions against the machine and result in changing internal developer settings in Microsoft Edge.", "creation_timestamp": "2024-08-12T09:20:51.000000Z"}, {"uuid": "e379349a-68f4-4ee4-927e-0f82449d3f85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/JWItrsCY8Nbfg1Bc1Is8JbRDl_l_krWtbFHYHVllCU9q0Q", "content": "", "creation_timestamp": "2023-12-30T09:17:27.000000Z"}, {"uuid": "a7567807-9078-4a7e-885e-5ac88eb7fca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/apPplaF6PmdjRCn_DMoOFIR72yrQoFHcCyHiFRbnLeojjA", "content": "", "creation_timestamp": "2023-12-23T01:38:13.000000Z"}, {"uuid": "fad657d2-2b78-4ca5-94b6-4733e4286bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7034", "content": "#exploit\n1. CVE-2022-36663:\nInternal network scanner through Gluu IAM blind ssrf\nhttps://github.com/Qeisi/CVE-2022-36663-PoC\n\n2. CVE-2022-21970:\nMicrosoft Edge (Chromium-based) EoP Vulnerability\nhttps://github.com/Malwareman007/CVE-2022-21970\n\n3. CVE-2022-39197:\nCobaltStrike &lt;= 4.7.1 RCE\nhttps://github.com/TheCryingGame/CVE-2022-39197-RCE", "creation_timestamp": "2022-10-23T19:30:28.000000Z"}, {"uuid": "242f8494-87df-4b2b-a674-7fe43935ae70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/Upo_magJq4oGdlmm3xawAx9czER3GnXZV14FHmP4UTm3V6A", "content": "", "creation_timestamp": "2022-10-24T09:44:59.000000Z"}, {"uuid": "eaf11f64-31f7-4bbd-a4df-688aa1e8b702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "Telegram/1f4j6NSN7glSGrSxtBBnMTbW4t4OnDyRfm9WlUAn0ZA", "content": "", "creation_timestamp": "2024-08-12T11:40:41.000000Z"}, {"uuid": "0d63e811-9679-4032-9df6-509b9fbf708b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21970", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/1550", "content": "\ud83d\udca5Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2022-21970). This vulnerability allows an attacker to execute javascript code on every host without permission, also an attacker can steal local system files, and also he can manipulate the actions against the machine and result in changing internal developer settings in Microsoft Edge.", "creation_timestamp": "2024-08-12T09:18:00.000000Z"}]}