{"vulnerability": "CVE-2023-36003", "sightings": [{"uuid": "61de3eed-c763-48e9-be7a-620d93730b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1830", "content": "https://github.com/m417z/CVE-2023-36003-POC\n\nPrivilege escalation using the XAML diagnostics AP\n#github", "creation_timestamp": "2024-01-15T05:12:43.000000Z"}, {"uuid": "b6c1e1e9-44f5-4804-a316-56d94a44d1c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/cKure/12686", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Privilege escalation using the XAML diagnostics API (CVE-2023-36003).\n\nhttps://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/", "creation_timestamp": "2024-04-06T22:39:07.000000Z"}, {"uuid": "39f8ab5c-1cd7-4015-9a24-fb8486c522b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/67", "content": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)\n\nhttps://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/", "creation_timestamp": "2024-01-13T20:11:17.000000Z"}, {"uuid": "b996a11b-51cd-46d7-93e6-f28b0d18e38e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3512", "content": "https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/", "creation_timestamp": "2024-01-12T14:44:49.000000Z"}, {"uuid": "65033daa-b577-40ed-b857-18c8af301d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/64", "content": "CVE-2023-36003 \nWindows LPE XAML diagnostics API\n\nBlog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/", "creation_timestamp": "2024-01-12T11:17:11.000000Z"}, {"uuid": "7a9c04cf-781e-4bb1-bab6-1a29fa4e9228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "Telegram/1674BjUB8N4Vh5UgM4C683OiwC85nxwmrNkvE4vdI1bn-w", "content": "", "creation_timestamp": "2024-01-12T07:52:16.000000Z"}, {"uuid": "c6a8f263-f115-42cd-be3f-e182a055b501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "Telegram/yp429WpOodMp2wsu9BvlVCzNIsLBmrj-pplNkdVTxRpCvg", "content": "", "creation_timestamp": "2024-01-13T00:03:50.000000Z"}, {"uuid": "ae2951a0-a81e-47b9-b331-26810db3feda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "Telegram/G7b-IjdRCp9obn-E1dGhNw5meFxDuDb6nmkyQHVeD0La-Q", "content": "", "creation_timestamp": "2024-01-13T00:02:07.000000Z"}, {"uuid": "4225519a-cdf4-48c6-8937-4acedcd35224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "Telegram/DQunrip3liepFqDC7aNZvKq8mX0CauQO62G1WmhAJnwiZvk", "content": "", "creation_timestamp": "2024-01-18T16:04:06.000000Z"}, {"uuid": "4ada0b7b-c82c-48d0-b4b2-144519526645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/399", "content": "CVE-2023-36003 (Windows LPE XAML diagnostics API) \n\nBlog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/\n\nPoC: https://github.com/m417z/CVE-2023-36003-POC\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 \u043f\u0430\u0442\u0447\u0435 \u043e\u0442 12 \u0434\u0435\u043a\u0430\u0431\u0440\u044f\n\n#lpe #ad #pentest #redteam", "creation_timestamp": "2024-01-13T20:54:53.000000Z"}, {"uuid": "9da6205e-890d-4854-8906-11d8234add07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1435", "content": "CVE-2023-36003 (Windows LPE XAML diagnostics API) \n\nBlog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/\n\nPoC: https://github.com/m417z/CVE-2023-36003-POC\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 \u043f\u0430\u0442\u0447\u0435 \u043e\u0442 12 \u0434\u0435\u043a\u0430\u0431\u0440\u044f\n\n#lpe #ad #pentest #redteam", "creation_timestamp": "2024-01-12T06:34:42.000000Z"}, {"uuid": "a4d82959-ce37-48e1-ae6b-14ddc782c6dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8228", "content": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)\n\nhttps://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/", "creation_timestamp": "2024-01-13T21:10:18.000000Z"}, {"uuid": "84557287-8ae7-45ef-a25e-92f9b9fd5a79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9771", "content": "#exploit\n1. CVE-2023-36003:\nPrivilege escalation using the XAML diagnostics API\nhttps://github.com/m417z/CVE-2023-36003-POC\n\n2. CVE-2023-46474:\nPMB &lt;=7.5.3 - RCE via Unrestricted File Upload\nhttps://github.com/Xn2/CVE-2023-46474\n\n3. CVE-2022-36553:\nHytec Inter HWL-2511-SS Unauthenticated Remote Command Injection\nhttps://github.com/0xNslabs/CVE-2022-36553-PoC", "creation_timestamp": "2024-01-13T04:11:16.000000Z"}, {"uuid": "2a112020-09f7-475b-9260-dce43dd41bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36003", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2506", "content": "#exploit\n1. CVE-2023-36003:\nPrivilege escalation using the XAML diagnostics API\nhttps://github.com/m417z/CVE-2023-36003-POC\n\n2. CVE-2023-46474:\nPMB &lt;=7.5.3 - RCE via Unrestricted File Upload\nhttps://github.com/Xn2/CVE-2023-46474\n\n3. CVE-2022-36553:\nHytec Inter HWL-2511-SS Unauthenticated Remote Command Injection\nhttps://github.com/0xNslabs/CVE-2022-36553-PoC", "creation_timestamp": "2024-08-16T09:01:27.000000Z"}]}