{"vulnerability": "CVE-2024-2066", "sightings": [{"uuid": "53c2d398-6c16-4d70-9553-b4d5b9acdcec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://t.me/GithubRedTeam/6606", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aDescription for CVE-2024-25466\nURL\uff1ahttps://github.com/nnotwen/Script-For-CVE-2024-20666\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-02-15T13:58:14.000000Z"}, {"uuid": "5a88cb9a-d421-4ae7-a5ce-c0b440875a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llzctevcov2u", "content": "", "creation_timestamp": "2025-04-04T21:02:05.862767Z"}, {"uuid": "5805cd07-65b0-4fea-a437-999fde78a8ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "published-proof-of-concept", "source": "Telegram/LavM1ny4lAq6KX4GIaGKRXMHLTsBbdXq6-Qb46iUfrPj0ug", "content": "", "creation_timestamp": "2025-11-29T03:00:05.000000Z"}, {"uuid": "90742936-4646-45a8-90f7-17f8e86f6df2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8041", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE).\nURL\uff1ahttps://github.com/invaderslabs/CVE-2024-20666\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T13:40:45.000000Z"}, {"uuid": "b52d0519-c6a5-4fea-9d50-0687767b2381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8093", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aHow to Check And fix 0x80070643 windows update error That Leads To CVE-2024-20666. \nURL\uff1ahttps://github.com/HYZ3K/cve-2024-20666\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-27T11:35:28.000000Z"}, {"uuid": "f5b7d2b0-91f9-4e69-8393-1e48f8ca05e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8092", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aHow to Check And fix 0x80070643 windows update error That Leads To CVE-2024-20666. \nURL\uff1ahttps://github.com/HYZ3K/CVE-2024-20666\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-27T11:30:36.000000Z"}, {"uuid": "a11ed01d-1b05-47b7-91b7-5615a2013bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20664", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14677", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20664\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Message Queuing Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:04.806Z\n\ud83d\udccf Modified: 2025-05-03T01:46:46.378Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20664", "creation_timestamp": "2025-05-03T02:16:47.000000Z"}, {"uuid": "3e28066b-86cf-4d79-9ed1-9bc146fd4627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20661", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14680", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20661\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:03.072Z\n\ud83d\udccf Modified: 2025-05-03T01:46:44.588Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20661", "creation_timestamp": "2025-05-03T02:16:50.000000Z"}, {"uuid": "5909ffd4-8b24-4895-bd3f-d5d87e4ca73d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20662", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14679", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20662\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:03.649Z\n\ud83d\udccf Modified: 2025-05-03T01:46:45.136Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20662", "creation_timestamp": "2025-05-03T02:16:49.000000Z"}, {"uuid": "dc16c66e-03e6-4198-86ef-c67e3e466c29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20663", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14678", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20663\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows Message Queuing Client (MSMQC) Information Disclosure\n\ud83d\udccf Published: 2024-01-09T17:57:04.193Z\n\ud83d\udccf Modified: 2025-05-03T01:46:45.793Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20663", "creation_timestamp": "2025-05-03T02:16:48.000000Z"}, {"uuid": "abfbbdaa-eed5-4a89-9e58-98b362ef78e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20666\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: BitLocker Security Feature Bypass Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:56:44.469Z\n\ud83d\udccf Modified: 2025-05-03T01:46:43.410Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666", "creation_timestamp": "2025-05-03T02:16:52.000000Z"}, {"uuid": "70b2a054-a498-4dbe-b94f-1a35920521fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20660", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14681", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20660\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Message Queuing Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:02.464Z\n\ud83d\udccf Modified: 2025-05-03T01:46:43.932Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20660", "creation_timestamp": "2025-05-03T02:16:51.000000Z"}, {"uuid": "394dd7ea-b7fd-447e-80c7-9845318f2531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20667", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15805", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20667\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Azure DevOps Server Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-02-13T18:02:07.424Z\n\ud83d\udccf Modified: 2025-05-09T18:18:56.932Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20667", "creation_timestamp": "2025-05-09T18:26:16.000000Z"}, {"uuid": "b33ecd21-4f32-4bff-82da-16f3eda169de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://t.me/BleepingComputer/19235", "content": "\u200aMicrosoft working on a fix for Windows 10 0x80070643 errors\n\nMicrosoft is working to fix a known issue causing 0x80070643 errors when installing the KB5034441 security update that patches the CVE-2024-20666 BitLocker vulnerability. [...]\n\nhttps://www.bleepingcomputer.com/news/microsoft/microsoft-working-on-a-fix-for-windows-10-0x80070643-errors/", "creation_timestamp": "2024-01-15T21:47:59.000000Z"}, {"uuid": "bcadba8d-1082-4108-9e3a-ee3a9a67a589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/19216", "content": "\u200aMicrosoft shares script to update Windows 10 WinRE with BitLocker fixes\n\nMicrosoft has released a PowerShell script to automate updating the Windows Recovery Environment (WinRE) partition in order to fix CVE-2024-20666, a vulnerability that allowed for BitLocker encryption bypass. [...]\n\nhttps://www.bleepingcomputer.com/news/microsoft/microsoft-shares-script-to-update-windows-10-winre-with-bitlocker-fixes/", "creation_timestamp": "2024-01-11T21:45:34.000000Z"}, {"uuid": "66fd721b-a7c8-472e-9207-5daac22686fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://t.me/kasperskyb2b/1093", "content": "\ud83d\udfe6 \u041e\u0434\u043d\u043e \u0438\u0437 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 Patch Tuesday (KB5034441), \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0435\u0435 CVE-2024-20666 \u0441 \u043e\u0431\u0445\u043e\u0434\u043e\u043c \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f Bitlocker, \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0438 \u0432\u044b\u0434\u0430\u0451\u0442 \u0440\u0430\u0437\u043d\u043e\u043e\u0431\u0440\u0430\u0437\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u0441\u043b\u0438\u0448\u043a\u043e\u043c \u0431\u043e\u043b\u044c\u0448\u043e\u043c \u0440\u0430\u0437\u043c\u0435\u0440\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f WinRE (Windows recovery environment), \u0432\u0445\u043e\u0434\u044f\u0449\u0435\u043c \u0432 \u044d\u0442\u043e\u0442 \u043f\u0430\u0442\u0447. \u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u043d\u0430 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0438\u0439 \u0434\u0435\u043d\u044c \u2014 \u043f\u0435\u0440\u0435\u0440\u0430\u0437\u0431\u0438\u0442\u044c \u0434\u0438\u0441\u043a, \u0443\u0432\u0435\u043b\u0438\u0447\u0438\u0432 WinRE, \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u0437\u0434\u0435\u0441\u044c.\n\u0427\u0442\u043e \u0441\u043a\u0430\u0437\u0430\u0442\u044c, \u0433\u043e\u0434 \u2014 \u043d\u043e\u0432\u044b\u0439, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u2014 \u0441\u0442\u0430\u0440\u044b\u0435. \u041f\u0430\u0442\u0447\u0438\u0442\u044c \u043d\u0435\u043b\u044c\u0437\u044f \u043f\u043e\u0434\u043e\u0436\u0434\u0430\u0442\u044c, \u0437\u043d\u0430\u043a\u0438 \u043f\u0440\u0435\u043f\u0438\u043d\u0430\u043d\u0438\u044f \u0441\u0442\u0430\u0432\u0438\u043c \u043d\u0430 \u043b\u0438\u0447\u043d\u044b\u0439 \u0432\u043a\u0443\u0441.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-01-11T17:50:34.000000Z"}, {"uuid": "62125a90-22c8-4cbe-9512-e4093c0a4f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://t.me/ctinow/165269", "content": "https://ift.tt/mMxDjNL\nCVE-2024-20666", "creation_timestamp": "2024-01-09T19:26:49.000000Z"}, {"uuid": "83bc2bab-cb56-4be9-bbd6-7c7845af2019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2066", "type": "seen", "source": "https://t.me/ctinow/197775", "content": "https://ift.tt/YNRCdg1\nCVE-2024-2066", "creation_timestamp": "2024-03-01T16:21:58.000000Z"}, {"uuid": "0f78f4c7-2519-4088-b72c-ffe34a617dd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2066", "type": "seen", "source": "https://t.me/ctinow/197769", "content": "https://ift.tt/YNRCdg1\nCVE-2024-2066", "creation_timestamp": "2024-03-01T16:21:52.000000Z"}, {"uuid": "9638701b-1cdb-4ad2-9090-5b80ae0a9756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2066", "type": "seen", "source": "https://t.me/ctinow/197523", "content": "https://ift.tt/jvkqpSP\nCVE-2024-2066 | SourceCodester Computer Inventory System 1.0 add-computer.php model cross site scripting", "creation_timestamp": "2024-03-01T11:41:31.000000Z"}, {"uuid": "dce9263d-a1bd-4d75-9327-509cbec5d055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20667", "type": "seen", "source": "https://t.me/ctinow/184085", "content": "https://ift.tt/Ncap2kH\nCVE-2024-20667 | Microsoft Azure DevOps Server 2019.1.2/2020.1.2/2022.1 Privilege Escalation", "creation_timestamp": "2024-02-13T19:36:32.000000Z"}, {"uuid": "125601d9-e500-4e5e-9112-614b935920b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20660", "type": "seen", "source": "https://t.me/ctinow/165291", "content": "https://ift.tt/W7JU5NI\nCVE-2024-20660 | Microsoft Windows up to Server 2022 23H2 Message Queuing information disclosure", "creation_timestamp": "2024-01-09T19:47:30.000000Z"}, {"uuid": "c9ad15e8-f2d0-49dd-8c62-9f74089210cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "seen", "source": "https://t.me/ctinow/165296", "content": "https://ift.tt/WapCiBx\nCVE-2024-20666 | Microsoft Windows up to Server 2022 23H2 BitLocker Local Privilege Escalation", "creation_timestamp": "2024-01-09T19:47:37.000000Z"}, {"uuid": "07c059db-7419-491d-9f98-809aaa0f5746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20664", "type": "seen", "source": "https://t.me/ctinow/165295", "content": "https://ift.tt/ocI8ftX\nCVE-2024-20664 | Microsoft Windows up to Server 2022 23H2 Message Queuing information disclosure", "creation_timestamp": "2024-01-09T19:47:35.000000Z"}, {"uuid": "9ff99a89-9a41-46c0-a311-3af245a00df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20663", "type": "seen", "source": "https://t.me/ctinow/165294", "content": "https://ift.tt/YckrRIJ\nCVE-2024-20663 | Microsoft Windows up to Server 2022 23H2 Message Queuing Client information disclosure", "creation_timestamp": "2024-01-09T19:47:34.000000Z"}, {"uuid": "c698b022-9e0a-4105-9dda-9cce24dfed24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20661", "type": "seen", "source": "https://t.me/ctinow/165292", "content": "https://ift.tt/wd1G0jA\nCVE-2024-20661 | Microsoft Windows up to Server 2022 23H2 Message Queuing denial of service", "creation_timestamp": "2024-01-09T19:47:31.000000Z"}, {"uuid": "ffa16c84-49ab-4e0e-9301-0b3a1ae251c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20662", "type": "seen", "source": "https://t.me/ctinow/165293", "content": "https://ift.tt/DsZKvf8\nCVE-2024-20662 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 Online Certificate Status Protocol information disclosure", "creation_timestamp": "2024-01-09T19:47:32.000000Z"}, {"uuid": "6d8ed0cd-3150-4785-9a86-0d749ae38b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20664", "type": "seen", "source": "https://t.me/ctinow/165268", "content": "https://ift.tt/qX4kswo\nCVE-2024-20664", "creation_timestamp": "2024-01-09T19:26:47.000000Z"}, {"uuid": "4e619c5c-a37f-47c6-b734-e99c2d9207fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20663", "type": "seen", "source": "https://t.me/ctinow/165267", "content": "https://ift.tt/tpA4eIa\nCVE-2024-20663", "creation_timestamp": "2024-01-09T19:26:46.000000Z"}, {"uuid": "de68fa73-f39e-4cf3-8035-617f326f33a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20662", "type": "seen", "source": "https://t.me/ctinow/165266", "content": "https://ift.tt/8A4gNvr\nCVE-2024-20662", "creation_timestamp": "2024-01-09T19:26:45.000000Z"}, {"uuid": "ca97a7f0-4b50-4049-b04e-4c984c55fe88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20661", "type": "seen", "source": "https://t.me/ctinow/165265", "content": "https://ift.tt/bJIi0al\nCVE-2024-20661", "creation_timestamp": "2024-01-09T19:26:43.000000Z"}, {"uuid": "d7337620-4f22-44be-992c-261c72e0edc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20660", "type": "seen", "source": "https://t.me/ctinow/165264", "content": "https://ift.tt/xDFtfzO\nCVE-2024-20660", "creation_timestamp": "2024-01-09T19:26:42.000000Z"}, {"uuid": "bafe4bb4-12a6-4f18-b2cb-e388acac0632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20666", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9984", "content": "#hardening\n#Blue_Team_Techniques\nPowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in CVE-2024-20666\nhttps://github.com/nnotwen/Script-For-CVE-2024-20666", "creation_timestamp": "2024-02-19T13:06:35.000000Z"}]}