{"vulnerability": "CVE-2022-37998", "sightings": [{"uuid": "dcd1800f-7bed-4859-bd53-dbf3794726cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37998", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1787", "content": "\ud83d\udd25You\u2019ve Crossed the Line \u2014 Disturbing a Host\u2019s Rest\n\nAkamai Security Research dove deeply into MS-RPC research this past year. For a protocol that does so much, MS-RPC is largely under-researched, and it can have real-world effects. One of those effects is that vulnerabilities in an RPC interface become exposed. This is what we are focusing on in this blog post: vulnerabilities within the Local Session Manager (LSM) RPC interface. \n\n\ud83d\udd25cve-2022-37973 PoC Exploit \n\ud83d\udd25cve-2022-37998 PoC Exploit\n\n\ud83e\uddf0RPC Toolkit(set of tools, articles, blog posts and links to help security researchers drive their RPC research)", "creation_timestamp": "2022-12-15T17:06:35.000000Z"}, {"uuid": "ee0f6138-4e8c-4a12-b244-5b9849b51f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37998", "type": "seen", "source": "https://t.me/cibsecurity/51166", "content": "\u203c CVE-2022-37973 \u203c\n\nWindows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T22:32:15.000000Z"}]}