{"vulnerability": "CVE-2024-29988", "sightings": [{"uuid": "6f40513e-e93e-4c39-a89e-3e1cc59ae9df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://www.thezdi.com/blog/2024/8/14/cve-2024-38213-copy2pwn-exploit-evades-windows-web-protections", "content": "", "creation_timestamp": "2024-08-15T15:41:52.000000Z"}, {"uuid": "e703f602-e1db-4da8-a087-a85409fb7e67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-04-30T21:10:02.000000Z"}, {"uuid": "605de4ac-0758-4b83-8f17-26dfd3951b02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://www.thezdi.com/blog/2025/1/8/zdi-threat-hunting-2024-highlights-trends-amp-challenges", "content": "", "creation_timestamp": "2025-01-08T16:07:59.000000Z"}, {"uuid": "ac1fe5ea-a896-40bd-93d3-02b2d3a33d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfaqqb4ci62o", "content": "", "creation_timestamp": "2025-01-08T18:03:07.950292Z"}, {"uuid": "3a2c059b-6fc7-4d8a-9c70-104ac8b1a50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2f4f3b6f-f8d4-40fa-8108-7b2261c96b33", "content": "", "creation_timestamp": "2026-02-02T12:26:37.507986Z"}, {"uuid": "a64afd89-2306-4298-8123-5581574191f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:54.000000Z"}, {"uuid": "2af091ab-a7f3-4301-bb51-925e376f1d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1267", "content": "", "creation_timestamp": "2024-04-10T04:00:00.000000Z"}, {"uuid": "a7002d2f-cb97-4fd3-9687-edeb7eb301db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://t.me/CyberSecurityIL/42459", "content": "\u05d0\u05e4\u05e8\u05d5\u05e4\u05d5 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea, \u05de\u05e6\u05e8\u05e3 \u05dc\u05db\u05dd \u05de\u05d9\u05d3\u05e2 \u05e2\u05dc \u05db\u05de\u05d4 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d1\u05de\u05d5\u05e6\u05e8\u05d9\u05dd \u05e9\u05d5\u05e0\u05d9\u05dd:\n\n- \u05db\u05d7\u05dc\u05e7 \u05de\u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d7\u05d5\u05d3\u05e9\u05d9\u05d9\u05dd \u05e9\u05dc \u05d0\u05e4\u05e8\u05d9\u05dc 2024,  \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05de\u05e4\u05d9\u05e6\u05d4 \u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05e1\u05d5\u05d2\u05e8 2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea Zero Day \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05e1\u05d1\u05d9\u05d1 \u05dc\u05e2\u05d5\u05dc\u05dd -  CVE-2024-26234 \u05d5- CVE-2024-29988\n\n- \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1\u05e1\u05e4\u05e8\u05d9\u05d4 Rust \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (\u05ea\u05e7\u05e3 \u05e8\u05e7 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea Windows) -  CVE-2024-24576.\n\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 \u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05de\u05d3\u05d5\u05e8\u05d2\u05ea 10/10 \u05db\u05e9\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d7\u05dc\u05d4 \u05e2\u05dc Rust standard library \u05dc\u05e4\u05e0\u05d9 \u05d2\u05e8\u05e1\u05d4 1.77.2.\n\n- \u05d7\u05d5\u05e7\u05e8\u05d9\u05dd \u05d7\u05e9\u05e4\u05d5 \u05d0\u05e8\u05d1\u05e2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d1\u05d8\u05dc\u05d5\u05d5\u05d9\u05d6\u05d9\u05d5\u05ea \u05d4\u05d7\u05db\u05de\u05d5\u05ea \u05e9\u05dc LG - \u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e2\u05dc \u05db\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea - \u05db\u05d0\u05df\n\nhttps://t.me/CyberSecurityIL/4978\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-04-10T13:01:14.000000Z"}, {"uuid": "15f24813-a9cb-4f0f-97c0-e2978b08817c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://t.me/kasperskyb2b/1221", "content": "\ud83d\udcbb \u0410\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439: \u0434\u0432\u0430 0-day \u0438 \u043a\u0430\u0448\u0430 \u0432 \u0420\u0435\u0434\u043c\u043e\u043d\u0434\u0435\n\nMicrosoft \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 150 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445  \u0432\u0441\u0435\u0433\u043e \u0442\u0440\u0438 \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 (\u0432\u0441\u0435 \u2014 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 Defender for IoT). \u0418\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u044f\u0432\u043b\u044f\u043b\u0430, \u0447\u0442\u043e \u043d\u0438 \u043e\u0434\u043d\u0430 \u0434\u044b\u0440\u0430 \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432\u0436\u0438\u0432\u0443\u044e, \u043d\u043e \u0441\u043f\u0443\u0441\u0442\u044f \u0432\u0441\u0435\u0433\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0447\u0430\u0441\u043e\u0432 \u043d\u0430\u0447\u0430\u043b\u0430 \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043a\u043e\u0440\u0440\u0435\u043a\u0446\u0438\u0438 \u0432 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0438. CVE-2024-26234 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0443 \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0430 CVE-2024-29988 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c WIndows SmartScreen. \u041e\u043d \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0442\u043e\u0440\u043e\u0439 \u0447\u0430\u0441\u0442\u044c\u044e \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043f\u0435\u0440\u0432\u0443\u044e \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0443 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 (CVE-2024-21412). \u0420\u0430\u043d\u0435\u0435 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0435\u043c \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 ransomware. \n\n\u041f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u044b\u0440\u044b \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 important. \u0410\u0436 67 \u0448\u0442\u0443\u043a \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, 31 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 27 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 12 \u2014 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 7 DoS. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e Microsoft \u043d\u0430\u0447\u0430\u043b\u0430 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0442\u044c \u0442\u0438\u043f \u0434\u0435\u0444\u0435\u043a\u0442\u0430 (CWE) \u0432 \u043a\u0430\u0440\u0442\u043e\u0447\u043a\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044f.\n\n\u0421\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u043c\u0435\u044e\u0449\u0438\u0445 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u0431\u0443\u0434\u0443\u0449\u0435\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 RCE \u0432 RPC (CVE-2024-20678) \u0438 \u0432 Excel (CVE-2024-26257).\n\n\u0426\u0435\u043b\u044b\u0445 41 CVE \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430\u043c ODBC (Open Database Connectivity), \u0432\u0438\u0434\u0438\u043c\u043e \u0432 \u043d\u0438\u0445 \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0442\u044f\u043d\u0443\u043b \u043d\u0430 CVSS 8.8. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0441\u043b\u043e\u0436\u043d\u043e\u0432\u0430\u0442\u0430 \u2014 \u043d\u0430\u0434\u043e \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c\u0441\u044f \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 SQL-\u0441\u0435\u0440\u0432\u0435\u0440\u0443. \n\n\u0415\u0449\u0451 24 CVE \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 secure boot. \u041a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u0441 secure boot, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0441\u043e\u043f\u0440\u044f\u0436\u0435\u043d\u0430 \u0441 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u0440\u0443\u0447\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0435\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f DBX.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-04-10T09:11:17.000000Z"}, {"uuid": "0117f5b9-3606-44fb-a699-6408a4c33009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://t.me/arpsyndicate/4449", "content": "#ExploitObserverAlert\n\nCVE-2024-29988\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-29988. SmartScreen Prompt Security Feature Bypass Vulnerability\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-04-11T06:01:07.000000Z"}, {"uuid": "f19290df-9f12-400b-81c2-5a276ff5b24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://t.me/information_security_channel/51923", "content": "Microsoft Patches Two Zero-Days Exploited for Malware Delivery\nhttps://www.securityweek.com/microsoft-patches-two-zero-days-exploited-for-malware-delivery/\n\nMicrosoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware.\nThe post Microsoft Patches Two Zero-Days Exploited for Malware Delivery (https://www.securityweek.com/microsoft-patches-two-zero-days-exploited-for-malware-delivery/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-10T14:03:19.000000Z"}, {"uuid": "0d075d90-486b-47d6-bf1b-cd72a2afde87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://t.me/ctinow/214580", "content": "https://ift.tt/0SPjY3y\nMicrosoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988) - Help Net Security", "creation_timestamp": "2024-04-10T00:21:48.000000Z"}, {"uuid": "81a723a4-4f75-42d2-ad4f-c0ab9aea2611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://t.me/ctinow/214562", "content": "https://ift.tt/0SPjY3y\nMicrosoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988)", "creation_timestamp": "2024-04-09T21:41:41.000000Z"}]}