{"vulnerability": "CVE-2022-3016", "sightings": [{"uuid": "be11a517-782a-43c7-8451-53c3d3ecd099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-30163", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=821", "content": "", "creation_timestamp": "2022-06-15T04:00:00.000000Z"}, {"uuid": "c1dbb6bd-484e-4024-9bad-6f2424c6db72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30166", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6404", "content": "#exploit\nCVE-2022-30166:\nWindows LSA Service LsapGetClientInfo Impersonation Level Check EoP\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2278", "creation_timestamp": "2022-07-15T12:26:53.000000Z"}, {"uuid": "25203545-e32c-45b5-9c05-cad690a0b280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30167", "type": "seen", "source": "https://t.me/cibsecurity/44581", "content": "\u203c CVE-2022-30167 \u203c\n\nAV1 Video Extension Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30193.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T02:26:46.000000Z"}, {"uuid": "39453710-1a89-49d4-b33e-82189e1eeb48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30168", "type": "seen", "source": "https://t.me/cibsecurity/44593", "content": "\u203c CVE-2022-30168 \u203c\n\nMicrosoft Photos App Remote Code Execution Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T08:52:07.000000Z"}, {"uuid": "569ac097-6969-4b79-8b77-b65f47542a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30163", "type": "seen", "source": "https://t.me/true_secator/3060", "content": "Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 PatchTuesday \u0437\u0430 \u0438\u044e\u043d\u044c 2022, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0432 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 55 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0438 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u0432\u0434\u043e\u043b\u044c \u0438 \u043f\u043e\u043f\u0435\u0440\u0435\u043a 0-day Follina.\n\n\u0421\u0440\u0435\u0434\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445: 3 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 RCE, 51 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 - \u043a\u0430\u043a \u0432\u0430\u0436\u043d\u0430\u044f \u0438 \u043e\u0434\u043d\u0430 - \u043a\u0430\u043a \u0443\u043c\u0435\u0440\u0435\u043d\u043d\u0430\u044f. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e,\u00a0\u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Microsoft Edge \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b 5 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u041e\u0431\u0449\u0435\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c: 12 - \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439; 1 - \u043e\u0431\u0445\u043e\u0434\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 27 - RCE, 11 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 3 - \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, 1 - \u0441\u043f\u0443\u0444\u0438\u043d\u0433. \u041f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u0437\u0434\u0435\u0441\u044c.\n\n\u0413\u043b\u0430\u0432\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u0435\u043c \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0430\u0442\u0447\u0430 \u0441\u0442\u0430\u043b\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 Follina, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 PowerShell \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c Windows Microsoft Diagnostic Tool (MSDT) \u043f\u043e\u0441\u043b\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u044f \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430 Word.\n\n\u041f\u043e\u043c\u0438\u043c\u043e CVE-2022-30190 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0440\u0443\u0433\u0438\u0445 RCE \u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 Windows (CVE-2022-30136), Windows Hyper-V (CVE-2022-30163), Windows Lightweight Directory Access Protocol, Microsoft Office, HEVC \u0438 Azure RTOS GUIX Studio.\n\n\u0415\u0449\u0435 \u043e\u0434\u043d\u0438\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f\u00a0CVE-2022-30147\u00a0(\u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 CVSS 7,8), \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u043c \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0449\u0438\u043a\u0435 Windows \u0438 \u0441 \u043e\u0442\u043c\u0435\u0442\u043a\u043e\u0439 Microsoft - \u00ab\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u043e\u043b\u0435\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0430\u044f\u00bb.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0440\u0430\u0434\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0441\u0438\u043b\u044c\u043d\u043e \u043d\u0435 \u0441\u0442\u043e\u0438\u0442, \u0432\u0435\u0434\u044c \u043f\u043e\u043c\u043d\u0438\u0442\u044c\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440\u0430\u00a0\u043e\u0447\u0435\u0440\u0435\u0434\u0438\u00a0\u043f\u0435\u0447\u0430\u0442\u0438\u00a0\u0432\u044b\u0445\u043e\u0434\u0438\u043b \u0441 \u044f\u043d\u0432\u0430\u0440\u044f 2022 \u0447\u0443\u0442\u044c \u043b\u0438 \u043d\u0435 \u043a\u0430\u0436\u0434\u044b\u0439 \u043c\u0435\u0441\u044f\u0446, \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u0441\u0442\u0430\u043b \u0442\u0435\u043a\u0443\u0449\u0438\u0439 \u043f\u0430\u0442\u0447, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0434\u043e\u0431\u0438\u043b\u0438 \u0431\u0430\u0433\u0443. \u041d\u043e \u0432\u0441\u0435 \u0440\u0430\u0432\u043d\u043e \u043d\u0435 \u0444\u0430\u043a\u0442.\n\n\u0412 \u0446\u0435\u043b\u043e\u043c, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, Microsoft \u0432 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u0440\u0430\u0437 \u043e\u0431\u043b\u0430\u0436\u0430\u043b\u0438\u0441\u044c: \u0435\u0441\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0437\u0430\u043d\u044f\u043b\u043e 2 \u043d\u0435\u0434\u0435\u043b\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438, \u0442\u043e\u0433\u0434\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0432\u043e\u043f\u0440\u043e\u0441, \u0430 \u043f\u043e\u0447\u0435\u043c\u0443 \u043e\u043d\u043e \u043d\u0435 \u0432\u044b\u0448\u043b\u043e \u0440\u0430\u043d\u044c\u0448\u0435, \u0432\u0435\u0434\u044c \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u0435\u0449\u0435 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435. \u041d\u043e \u043e\u0442\u0432\u0435\u0442 \u0432\u044b \u0443\u0436\u0435 \u0437\u043d\u0430\u0435\u0442\u0435.", "creation_timestamp": "2022-06-15T16:10:07.000000Z"}, {"uuid": "26a8e159-69ca-4e89-8bf2-895494f02908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3016", "type": "seen", "source": "https://t.me/cibsecurity/48941", "content": "\u203c CVE-2022-3016 \u203c\n\nUse After Free in GitHub repository vim/vim prior to 9.0.0285.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-28T16:32:41.000000Z"}, {"uuid": "1aff854a-81ff-4877-95e4-ead5ead98900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30161", "type": "seen", "source": "https://t.me/cibsecurity/44592", "content": "\u203c CVE-2022-30149 \u203c\n\nWindows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T02:26:58.000000Z"}, {"uuid": "c928a788-452f-45cc-89c5-3eae89e3055d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30165", "type": "seen", "source": "https://t.me/cibsecurity/44589", "content": "\u203c CVE-2022-30165 \u203c\n\nWindows Kerberos Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-16T02:26:54.000000Z"}, {"uuid": "2a8d128a-a407-4b86-a9cf-83ec5714788b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30164", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6356", "content": "#exploit\n1. CVE-2022-30164:\nKerberos KerbRetrieveEncodedTicketMessage AppContainer EoP\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2273\n\n2. CVE-2022-34265:\nDjango Trunc/Extract vulnerability\nhttps://github.com/aeyesec/CVE-2022-34265", "creation_timestamp": "2022-07-08T11:05:13.000000Z"}, {"uuid": "677148af-e824-4b87-ad8c-e738eed3f7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30165", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6344", "content": "#exploit\n1. CVE-2022-24545, CVE-2022-30165:\nKerberos Redirected Logon Buffer EoP (Windows Srv 2022)\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2271\n\n2. CVE-2022-29455:\nWordpress XSS\nhttps://github.com/GULL2100/Wordpress_xss-CVE-2022-29455", "creation_timestamp": "2022-07-06T21:55:00.000000Z"}]}