{"vulnerability": "CVE-2022-41050", "sightings": [{"uuid": "e36e3f21-123a-4703-b047-fbd6e38c5ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1850", "content": "#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo", "creation_timestamp": "2022-12-18T11:59:52.000000Z"}, {"uuid": "b314bd5a-0754-4a05-96d9-fe13fbed46e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/hackingshadow/2745", "content": "#TheShadowArmy\n\n#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo\n\n_-_-_-_-_-_- \u269cJOIN NOW \u269c -_-_-_-_-_-_\n \u274d\u274d\u274d \u2756 @HackingShadow \u2756 \u274d\u274d\u274d", "creation_timestamp": "2023-01-12T12:23:26.000000Z"}, {"uuid": "e8a47d68-e581-43d5-ab06-24f87ac69af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1823", "content": "\ud83d\udd25Win32k User-Mode Printer Drivers StartDoc UAF\n(PoC included)\n\nA vulnerability(CVE-2022-41050) in the way BoundClipRGNToSurface merges surfaces allows attackers to trigger a UAF due to a function that frees the used data and then access it. If the memory where the freed memory is properly prepared, the attacker can control the crash and cause it to execute arbitrary code.", "creation_timestamp": "2022-12-17T05:04:49.000000Z"}, {"uuid": "19574b5d-1e6d-4e0e-84d4-4b33883a9dfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "seen", "source": "https://t.me/cibsecurity/52744", "content": "\u203c CVE-2022-41050 \u203c\n\nWindows Extensible File Allocation Table Elevation of Privilege Vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-10T00:36:47.000000Z"}, {"uuid": "1e047583-7592-4924-a67c-b5d978b67d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41050", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7381", "content": "#exploit\n1. CVE-2022-41050:\nA vulnerability in the MS Windows' User-Mode Printer Drivers\nhttps://ssd-disclosure.com/win32k-user-mode-printer-drivers-startdoc-uaf\n\n2. CVE-2022-46689:\nmacOS Dirty Cow bug\nhttps://github.com/zhuowei/MacDirtyCowDemo\n\n3. CVE-2022-39198:\nApache Dubbo Hession Deserialization Vulnerability Gadgets Bypass\nhttps://xz.aliyun.com/t/11961", "creation_timestamp": "2022-12-18T20:23:10.000000Z"}]}