{"vulnerability": "CVE-2023-24905", "sightings": [{"uuid": "e79a34b4-5926-4e7f-9db2-94d85920ecd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24905", "type": "seen", "source": "https://t.me/poxek/2923", "content": "Microsoft \u00b7 Windows 10 22H2\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0441\u0442\u043e\u043b\u0430\nCVE-2023-24905\n\n\u041a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0442\u0435\u0445\u043d\u0438\u043a\u0430 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c DLL Hijacking \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 RDP-\u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Windows \u043d\u0430 ARM. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0436\u0435\u0440\u0442\u0432\u044b, \u0437\u0430\u043c\u0435\u043d\u0438\u0432 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u0439 DLL \u043d\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439.\n\n#CVE #RCE", "creation_timestamp": "2023-05-23T12:12:20.000000Z"}, {"uuid": "35990d4f-16d1-4f96-9db3-4d7d73e51ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24905", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11019", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Exploiting Windows on ARM RDP Client (CVE-2023-24905).\n\nhttps://cyolo.io/blog/dll-hijacking-strikes-back-exploiting-windows-on-arm-rdp-client-cve-2023-24905/", "creation_timestamp": "2023-05-24T13:50:56.000000Z"}, {"uuid": "3f7d3c70-aba3-4a91-a795-1e16c966ba31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24905", "type": "published-proof-of-concept", "source": "Telegram/oHTyJXWzQ7gJusCYPkEAxtxlG4lpqxFmrTQDmtPR7jUQ", "content": "", "creation_timestamp": "2023-08-12T18:21:03.000000Z"}, {"uuid": "dc004418-a3e1-4892-9816-185f2c6e59be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24905", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3534", "content": "https://cyolo.io/blog/dll-hijacking-strikes-back-exploiting-windows-on-arm-rdp-client-cve-2023-24905/", "creation_timestamp": "2023-08-20T08:24:16.000000Z"}, {"uuid": "cbee9e55-86aa-497f-be7b-363113e2a5c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24905", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8358", "content": "#Threat_Research\nDLL Hijacking Strikes Back: Exploiting Windows on ARM RDP Client (CVE-2023-24905)\nhttps://cyolo.io/blog/dll-hijacking-strikes-back-exploiting-windows-on-arm-rdp-client-cve-2023-24905", "creation_timestamp": "2023-05-24T12:18:28.000000Z"}]}