{"vulnerability": "CVE-2022-21999", "sightings": [{"uuid": "876b16de-19fb-472f-aea5-f39a820318ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "82d81613-5ba2-46ec-a5c5-0651538a03a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/bd1c3290-9486-4bf9-ae59-fe17c0948133", "content": "", "creation_timestamp": "2023-09-06T13:44:31.000000Z"}, {"uuid": "eb6f7b48-5ba5-419b-ab77-9370d27503a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971452", "content": "", "creation_timestamp": "2024-12-24T20:29:33.212237Z"}, {"uuid": "3b68a024-8be9-4026-af40-2b7de0ffdf42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "9e1bc99c-dfbf-4178-8843-df9f6c5e940f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=736", "content": "", "creation_timestamp": "2022-02-09T04:00:00.000000Z"}, {"uuid": "45da05b3-98db-4419-8849-d23b3cb9f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}, {"uuid": "7b2a55f0-dfab-4773-b669-b5e988719d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2022_21999_spoolfool_privesc.rb", "content": "", "creation_timestamp": "2022-03-16T13:56:13.000000Z"}, {"uuid": "308bc1b5-1b49-44bc-b3ef-ca940972d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}, {"uuid": "a13d1a45-f832-49a5-a4b4-7513aa2158e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21999", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/54c7f9b1-8660-4360-82f7-8a9d0f201afa", "content": "", "creation_timestamp": "2026-02-02T12:27:58.841823Z"}, {"uuid": "ed441dd2-4e4f-489f-b9bb-5ce541244508", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/203", "content": "\u041f\u0440\u0438\u0432\u0435\u0442, \u043a\u043e\u0442\u043a\u0438.  \ud83d\udc31\n\u042d\u0442\u043e\u0442 \u043f\u043e\u0441\u0442 \u044f \u0440\u0435\u0448\u0438\u043b\u0430 \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u043a\u0430\u043a \u0441\u0431\u043e\u0440\u043d\u0438\u043a \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u0430, \u043d\u043e \u043d\u0435 \u0431\u0435\u0433\u0438\u0442\u0435 \u0440\u0430\u0441\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u0443\u0442 \u043c\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0433\u043e. \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u0431\u043e\u0440\u043d\u0438\u043a\u0438 \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u0430,  \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 poc,  \u0438 \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u043a\u0440\u0443\u0442\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438!\ud83d\udd11\n\n\u041f\u0430\u043c - \u0425\u043e\u0440\u043e\u0448\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u043f\u0440\u043e \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0435\u0432\u0435\u043b\u0438\u043a\u0438\u0439 \u0438 \u043a\u0430\u043a \u044d\u0442\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \n\n\u041f\u0430\u043c -  \u0421\u0442\u0430\u0442\u044c\u044f \u043f\u0440\u043e \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043d\u0430 \u0432\u0438\u043d\u0434\u0435.  \u0412 \u043d\u0435\u0439 \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u044e\u0442\u0441\u044f \u0442\u0435\u043c\u044b \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a:  \u041a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043f\u043e\u0442\u043e\u043a\u0430 \u0438 \u0437\u0430\u0449\u0438\u0442\u0430 \u043e\u0431\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u043f\u043e\u0442\u043e\u043a\u0430; SMEP, \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0430\u044e\u0449\u0438\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u044f\u0434\u0440\u0430; ASLR, DEP \u0438 \u0432\u0441\u0435 \u0442\u0430\u043a\u043e\u0435, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0443\u0442\u0435\u0447\u043a\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u044f\u0434\u0440\u0430; \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 \n\n\u041f\u0430\u043c - \u0421\u0431\u043e\u0440\u043d\u0438\u043a \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u043e\u0432 \u043d\u0430 \u0433\u0438\u0442\u0445\u0430\u0431\u0435 \u043f\u0440\u043e \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0442\u0430\u043c \u0435\u0441\u0442\u044c \u0442\u0430\u043a\u0438\u0435 \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u044b \u043a\u0430\u043a: \u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u044d\u0442\u043e\u0433\u043e; \u041f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439; \u041f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 EoP \u2014 \u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043d\u0430\u043b\u044b; EoP \u2014 \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044f\u0434\u0440\u0430. \u0418 \u043e\u0447\u0435\u043d\u044c \u043c\u043d\u043e\u0433\u043e \u0447\u0435\u0433\u043e \u0435\u0449\u0435,  \u0434\u0443\u043c\u0430\u044e \u043a\u043e\u043c\u0443-\u0442\u043e \u0442\u043e\u0447\u043d\u043e \u043f\u0440\u0438\u0433\u043e\u0434\u0438\u0442\u044c\u0441\u044f \n\n\u041f\u0430\u043c - \u042d\u0442\u043e\u0442 \u0441\u043a\u0440\u0438\u043f\u0442 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0441 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0435\u0439 Windows, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u041e\u043d \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e , \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u043e\u043b\u0435\u0437\u043d\u0430 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \n\n\u041f\u0430\u043c- \u0421\u0431\u043e\u0440\u043d\u0438\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0434\u043b\u044f \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043d\u0430 windows \u0438 poc \u043d\u0430 \u043d\u0438\u0445.  \u0422\u0430\u043c \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \n\n\u041f\u0430\u043c- \u041f\u0440\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c,  WADComs  \u0448\u043f\u0430\u0440\u0433\u0430\u043b\u043a\u0430, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0430\u044f  \u0441\u043f\u0438\u0441\u043e\u043a \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438,  \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0432 \u0441\u0440\u0435\u0434\u0430\u0445 Windows.\n\n\u041f\u0430\u043c - \u041f\u0440\u043e  CVE 2022-29072 \u2014 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435/\u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u0435 \u0432 Powershell\n\n\u041f\u0430\u043c - \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2022-21999 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u0435\u0447\u0430\u0442\u0438 Windows, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \n\n\u041f\u0430\u043c - \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u043d\u0430 \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0443\u044e CVE-2022-21882\n\n\u041f\u0430\u043c - \u041d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043c\u0430\u043d\u0443\u043b \u0441 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u0434\u043b\u044f \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-09-30T01:59:22.000000Z"}, {"uuid": "ed4d7019-7d97-4053-90bc-d56b265aa838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/204", "content": "Hello, cats.  \ud83d\udc31\nI decided to make this post as a collection of stuff, but don't get upset, there is a lot of useful stuff here. \nFor example various other compilations of material, various vulnerabilities and poc, and of course cool articles!\ud83d\udd11\n\nLink - A good article about exceeding a threshold and how it works \n\nLink - A good article about overriding privileges on the wind.  It deals with topics such as:  Flow control and reverse flow protection; SMEP, preventing execution of trivial kernel code; ASLR, DEP and stuff like that, including limiting kernel leaks; Using memory corruption \n\nLink - A collection of matertials on the githab about privilege overruns there are matertials like: Tools for this; Enumerating users; Enumerating the EoP network - named channels; EoP - Exploiting the kernel. And a lot more, I think someone will definitely find it useful \n\nLink - This script is for listing common Windows configuration problems that can be used to raise privileges locally. It also collects different information which can be useful for exploiting privilege overrides \n\nLink - A collection of windows privilege override vulnerabilities and poc on them.  There are quite a few different \n\nLink - About security, WADComs cheat sheet containing a list of offensive security tools you can use in Windows environments.\n\nLink - About  CVE 2022-29072 - Powershell detection/mitigation\n\nLink - Exploit for CVE-2022-21999 - Windows Print Queue Manager vulnerability related to privilege gaining \n\nLink - Exploit for notorious CVE-2022-21882\n\nLink - Little manulet with exploits for privilege escalation\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-11-19T11:29:33.000000Z"}, {"uuid": "8d907f9d-37b5-4a48-9a67-5818af739ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/288", "content": "\u0415\u0449\u0435 \u0440\u0430\u0437 \u0434\u043e\u0431\u0440\u044b\u0439 \u0434\u0435\u043d\u044c \u043c\u043e\u0438 \u0447\u0435\u0448\u0438\u0440\u0441\u043a\u0438\u0435 \u043a\u043e\u0442\u0438\u043a\u0438   \ud83d\udc08\ud83c\udfa9\n\n\u0412\u043e\u0442 \u0432\u0430\u043c \u043f\u043e\u0441\u0442-\u0441\u0431\u043e\u0440\u043d\u0438\u043a \u043f\u0440\u043e windows . \ud83c\udfaf\n\u0422\u043e\u0447\u043d\u0435\u0435 \u043f\u0440\u043e \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u0434\u043b\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0435\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 ,\u0438  \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0438 \u0441\u0442\u0430\u0442\u044c\u0438 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u044d\u043d\u043d\u043e\u0439 .\n\u041f\u043e\u0441\u0442 \u0441\u0434\u0435\u043b\u0430\u043d \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432 \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0446\u0435\u043b\u044f\u0445 \u0438 \u0434\u043b\u044f \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u044f \u0432\u0430\u0448\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 . \n\n\u041d\u0430\u0434\u0435\u044e\u0441\u044c \u0432\u0430\u043c \u0431\u0443\u0434\u0435\u0442 \u043f\u043e\u043b\u0435\u0437\u043d\u043e:\nWindows-RCE-\u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b\nWindows-\u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u043d\u0430 \u043c\u043d\u043e\u0433\u0438\u0435 cve \u043e\u0442 2012 \u0434\u043e 2017\n\u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u043d\u0430 CVE-2022-21907 \u0435\u0449\u0435 \u0442\u044b\u043a \n\u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u043d\u0430 CVE-2022-21999\n\u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u043d\u0430 CVE-2022-29072\n\u0421\u0431\u043e\u0440\u043d\u0438\u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043d\u0430 cve 2022 \u0433\u043e\u0434\u0430\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 Microsoft Security Response Center (MSRC)\nPrivatezilla -\u0438\u043d\u0442\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\n\n\nGood afternoon again my Cheshire cats \ud83d\udc08\ud83c\udfa9\n\nHere's a post-collection for you about windows . \ud83c\udfaf\nMore precisely about the different exploits for its various vulnerabilities , and tools and articles on security enna .\nThis post is only for introductory purposes and to improve your security. \n\nI hope you will find it useful:\nWindows-RCE-exploits\nWindows exploits for many cve from 2012 to 2017 \nExploits for CVE-2022-21907 more link \nExploits for CVE-2022-21999\nExploits for CVE-2022-29072 \nA collection of various exploits for cve 2022\nSecurity research from Microsoft Security Response Center (MSRC)\nPrivatezilla security tool\n#windows #attacks #cve #exploit #polymorphic #pentest", "creation_timestamp": "2022-10-30T15:50:43.000000Z"}, {"uuid": "1efa2235-23b0-4737-b721-2a95f499d35c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "Telegram/aWPQ6S4atnyDD3dUH3K-x1BU3R5-n4OL9JH-9OFaA4Rgfst8", "content": "", "creation_timestamp": "2025-01-30T02:17:48.000000Z"}, {"uuid": "5a7acc3b-ed14-4d24-bef3-070ac03f9338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://t.me/proxy_bar/748", "content": "Windows Privilege Escalation: SpoolFool\n\u041f\u0430\u0442\u0447\u0438\u043b\u0438, \u0444\u0438\u043a\u0441\u0438\u043b\u0438  CVE-2020-1048 \u0438  CVE-2020-1337, \u0430 \u0434\u044b\u0440\u0430 \u043e\u0441\u0442\u0430\u043b\u0430\u0441\u044c.\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-21999 (\u00abSpoolFool\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0430 NT AUTHORITY\\\\SYSTEM. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u044b 2 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 \u0430\u0442\u0430\u043a\u0438. \n\u041a\u0430\u043a \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043c\u0438\u0440 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0431\u0435\u0437 \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0435\u0442 \u0440\u0430\u0441\u043e\u0432\u043e \u0432\u0435\u0440\u043d\u044b\u0439 \u0438\u043d\u0434\u0443\u0441 Harshit Rajpal\n\u0427\u0438\u0442\u0430\u0435\u043c \u0442\u0443\u0442.\n#windows #LPE", "creation_timestamp": "2022-03-25T16:36:11.000000Z"}, {"uuid": "a87b0e62-1638-47fb-81c0-f7c33ec97b62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://t.me/reverse_dungeon/1515", "content": "Windows Privilege Escalation: SpoolFool\n\u041f\u0430\u0442\u0447\u0438\u043b\u0438, \u0444\u0438\u043a\u0441\u0438\u043b\u0438  CVE-2020-1048 \u0438  CVE-2020-1337, \u0430 \u0434\u044b\u0440\u0430 \u043e\u0441\u0442\u0430\u043b\u0430\u0441\u044c.\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-21999 (\u00abSpoolFool\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0430 NT AUTHORITY\\\\SYSTEM. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u044b 2 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 \u0430\u0442\u0430\u043a\u0438. \n\u041a\u0430\u043a \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043c\u0438\u0440 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0431\u0435\u0437 \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0435\u0442 \u0440\u0430\u0441\u043e\u0432\u043e \u0432\u0435\u0440\u043d\u044b\u0439 \u0438\u043d\u0434\u0443\u0441 Harshit Rajpal\n\u0427\u0438\u0442\u0430\u0435\u043c \u0442\u0443\u0442.\n#windows #LPE", "creation_timestamp": "2022-03-25T16:16:29.000000Z"}, {"uuid": "b5d25e7a-f021-42d7-abf8-58d9808fbe5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5380", "content": "#exploit\n1. CVE-2022-21241:\nCSV+ 0.8.0 - 2-Click Arbitrary Code Execution\nhttps://github.com/satoki/csv-plus_vulnerability\n\n2. CVE-2022-21999, CVE-2022-22718:\nSpoolFool - Windows Print Spooler Privilege Escalation\nhttps://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81\n]-&gt; The functional exploit and DLL:\nhttps://github.com/ly4k/SpoolFool", "creation_timestamp": "2024-10-11T22:00:31.000000Z"}, {"uuid": "299ccac6-6128-4724-a275-f9f27745a603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "Telegram/clcEmNxhZcHi4To_RQ1A8YVZFlVzgq1IWTEDSznqQFJxcxU", "content": "", "creation_timestamp": "2022-10-07T02:04:31.000000Z"}]}