{"vulnerability": "CVE-2022-4105", "sightings": [{"uuid": "b314bd5a-0754-4a05-96d9-fe13fbed46e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2745", "content": "#TheShadowArmy\n\n#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo\n\n_-_-_-_-_-_- \u269cJOIN NOW \u269c -_-_-_-_-_-_\n \u274d\u274d\u274d \u2756 @HackingShadow \u2756 \u274d\u274d\u274d", "creation_timestamp": "2023-01-12T12:23:26.000000Z"}, {"uuid": "65082c38-f437-4620-9bb6-f9102329b113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41055", "type": "published-proof-of-concept", "source": "Telegram/hHunREvgbrtai_owp0SSSQRV55NXHdmYyGGeQ_LtI5iwbwo", "content": "", "creation_timestamp": "2026-04-11T09:00:04.000000Z"}, {"uuid": "e36e3f21-123a-4703-b047-fbd6e38c5ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1850", "content": "#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo", "creation_timestamp": "2022-12-18T11:59:52.000000Z"}, {"uuid": "e8a47d68-e581-43d5-ab06-24f87ac69af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1823", "content": "\ud83d\udd25Win32k User-Mode Printer Drivers StartDoc UAF\n(PoC included)\n\nA vulnerability(CVE-2022-41050) in the way BoundClipRGNToSurface merges surfaces allows attackers to trigger a UAF due to a function that frees the used data and then access it. If the memory where the freed memory is properly prepared, the attacker can control the crash and cause it to execute arbitrary code.", "creation_timestamp": "2022-12-17T05:04:49.000000Z"}, {"uuid": "d492813b-0127-402f-91de-554decb9bbc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41057", "type": "seen", "source": "https://t.me/cibsecurity/52768", "content": "\u203c CVE-2022-41057 \u203c\n\nWindows HTTP.sys Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:46:20.000000Z"}, {"uuid": "19574b5d-1e6d-4e0e-84d4-4b33883a9dfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "seen", "source": "https://t.me/cibsecurity/52744", "content": "\u203c CVE-2022-41050 \u203c\n\nWindows Extensible File Allocation Table Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:36:47.000000Z"}, {"uuid": "f91505f2-6f15-440c-8ba5-fe918dd9ac3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41057", "type": "seen", "source": "https://t.me/crackcodes/1676", "content": "#exploit\n1. CVE-2022-2414:\nXXE\u00a0in pki-core\nhttps://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept\n\n2. CVE-2022-41057:\nWindows: HTTP.SYS Kerberos PAC Verification Bypass EoP\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2346\n\n3. CVE-2022-44638:\nInteger overflow in pixman_sample_floor_y leads to heap out-of-bounds write\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=234", "creation_timestamp": "2022-12-08T13:33:29.000000Z"}, {"uuid": "43438ea7-b7de-47e7-ab07-6c27697da21e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4105", "type": "seen", "source": "https://t.me/cibsecurity/53285", "content": "\u203c CVE-2022-4105 \u203c\n\nA stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-21T22:37:19.000000Z"}, {"uuid": "ee2ec183-5aea-4869-b470-44df3887d1bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41054", "type": "seen", "source": "https://t.me/cibsecurity/52739", "content": "\u203c CVE-2022-41054 \u203c\n\nWindows Resilient File System (ReFS) Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:36:40.000000Z"}, {"uuid": "eba37871-70ff-4389-a86e-bb340ef098eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41052", "type": "seen", "source": "https://t.me/cibsecurity/52763", "content": "\u203c CVE-2022-41052 \u203c\n\nWindows Graphics Component Remote Code Execution Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:42:48.000000Z"}, {"uuid": "afaf7a57-2230-4f15-be02-a51c5d2b4908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41055", "type": "seen", "source": "https://t.me/cibsecurity/52725", "content": "\u203c CVE-2022-41055 \u203c\n\nWindows Human Interface Device Information Disclosure Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:36:20.000000Z"}, {"uuid": "bb9313d9-e6c4-4e33-988f-3572b3dc5899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41057", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7321", "content": "#exploit\n1. CVE-2022-2414:\nXXE\u00a0in pki-core\nhttps://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept\n\n2. CVE-2022-41057:\nWindows: HTTP.SYS Kerberos PAC Verification Bypass EoP\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2346\n\n3. CVE-2022-44638:\nInteger overflow in pixman_sample_floor_y leads to heap out-of-bounds write\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=234", "creation_timestamp": "2022-12-08T11:03:01.000000Z"}, {"uuid": "1e047583-7592-4924-a67c-b5d978b67d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7381", "content": "#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo\n\n3. CVE-2022-39198:\nApache Dubbo Hession Deserialization Vulnerability Gadgets Bypass\nhttps://xz.aliyun.com/t/11961", "creation_timestamp": "2022-12-18T20:23:10.000000Z"}]}