{"vulnerability": "CVE-2022-41034", "sightings": [{"uuid": "9edabe08-913c-46b0-97ec-ae75b46e1743", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "b3e28db2-f3b7-4c64-b166-8a8035cfc675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "seen", "source": "https://t.me/cibsecurity/51159", "content": "\u203c CVE-2022-41034 \u203c\n\nVisual Studio Code Remote Code Execution Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T22:26:25.000000Z"}, {"uuid": "69500cb4-fcf7-40df-9d84-e239c7d6a933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:00.000000Z"}, {"uuid": "09ce4227-e2ed-45b3-8c11-7a47e4c907be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:48.000000Z"}, {"uuid": "6f591508-e77b-4ce9-927f-f6c386b41bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/vscode_ipynb_remote_dev_exec.rb", "content": "", "creation_timestamp": "2024-06-10T21:58:09.000000Z"}, {"uuid": "bd4e2024-9f70-48a1-9943-c906a9e23fbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/200", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:33:59.000000Z"}, {"uuid": "42ec35f5-44e4-4146-9d4b-f6abf003ed95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "seen", "source": "https://t.me/GrayHatsHack/7986", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:34:50.000000Z"}, {"uuid": "0f1aa0d2-33c4-4b1c-9703-dcbf1bf36b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3316", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:33:42.000000Z"}, {"uuid": "b8e3ecee-22eb-4acb-a362-d2e00118e0b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6752", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:34:50.000000Z"}, {"uuid": "a99d01be-bcbc-4bfb-bb76-be47538b03c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41034", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10673", "content": "#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE", "creation_timestamp": "2024-06-14T13:06:56.000000Z"}]}