{"vulnerability": "CVE-2024-30052", "sightings": [{"uuid": "94701998-a11e-40ed-b2f1-395062df6473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:27.000000Z"}, {"uuid": "556c10b4-43f4-46bd-98ac-de12d76fda48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:56.000000Z"}, {"uuid": "c15f60fb-9c81-436d-a943-71562f71ad0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8678", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aMaterials for CVE-2024-30052.\nURL\uff1ahttps://github.com/ynwarcs/CVE-2024-30052\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-04T20:40:05.000000Z"}, {"uuid": "28ff575a-2b2a-4bd6-9aef-81e8383276f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16597", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-30052\n\ud83d\udd25 CVSS Score: 4.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Visual Studio Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-06-11T17:00:10.658Z\n\ud83d\udccf Modified: 2025-05-16T00:13:06.475Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30052", "creation_timestamp": "2025-05-16T01:34:25.000000Z"}, {"uuid": "998d8376-a507-47e7-b8ef-363ce0ef1c38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1773", "content": "#exploit\n1. CVE-2024-20404:\nCisco Finesse Web-Based Management Interface XSS/SSRF\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052:\nExploiting Visual Studio via dump files\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353:\nCisco IOS XE DoS\nhttps://github.com/codeb0ss/CVE-2024-20353-PoC", "creation_timestamp": "2024-10-19T08:29:59.000000Z"}, {"uuid": "16d2fcbd-3b16-4609-9353-0ca165de9465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/CyberBulletin/1048", "content": "\u26a1\ufe0fExploiting Visual Studio via dump files - CVE-2024-30052.\n\n#CyberBulletin", "creation_timestamp": "2024-10-05T14:45:17.000000Z"}, {"uuid": "858a3341-bde2-401d-b13a-b3a3108df31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/orderofsixangles/2474", "content": "Exploiting AMD atdcm64a.sys arbitrary pointer dereference \u2013 Part 3\n\nLiving off Microsoft Copilot\n\nhunt down APTs\n\neBPF Crash Course for Beginners\n\nExploiting Visual Studio via dump files - CVE-2024-30052\n\nPowerShell Command History Forensics\n\nchill kernel hacking for fun\n\nSilently Install Chrome Extension For Persistence\n\nPopping Android Vulnerabilities From Notification to WebView XSS\n\nReverse Engineering Android Spyware ...with LaurieWired\n\n\u041c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b KLEE 2024 workshop (1,2)\n\nFuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments\n\nA collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID", "creation_timestamp": "2024-10-14T05:47:44.000000Z"}, {"uuid": "c74ffb84-ecf3-43d8-89c3-c83e547e8287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/5270", "content": "#exploit\n1. CVE-2024-20404:\nCisco Finesse Web-Based Management Interface XSS/SSRF\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052:\nExploiting Visual Studio via dump files\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353:\nCisco IOS XE DoS\nhttps://github.com/codeb0ss/CVE-2024-20353-PoC", "creation_timestamp": "2024-10-08T16:16:10.000000Z"}, {"uuid": "0f8019ec-e1a6-4911-86c6-a9b5f354c843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1808", "content": "#exploit\n1. CVE-2024-20404:\nCisco Finesse Web-Based Management Interface XSS/SSRF\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052:\nExploiting Visual Studio via dump files\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353:\nCisco IOS XE DoS\nhttps://github.com/codeb0ss/CVE-2024-20353-PoC", "creation_timestamp": "2024-10-08T16:16:11.000000Z"}, {"uuid": "ea75746a-b20f-4ab0-9fe2-17c11760eb01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15395", "content": "\u200aRCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files\n\nhttps://gbhackers.com/cve-2024-30052-visual-studio-exploit/", "creation_timestamp": "2024-10-08T03:27:20.000000Z"}, {"uuid": "34720a71-2547-4a61-98a8-610e1c543c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8876", "content": "Tools - Hackers Factory \n\n#exploit\n\n1. CVE-2024-20404: Cisco Finesse Web-Based Management Interface XSS/SSRF\n\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052: Exploiting Visual Studio via dump files\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353: Cisco IOS XE DoS\n\nhttps://github.com/codeb0ss/CVE-2\n\nThievingFox\n\nhttps://github.com/Slowerzs/ThievingFox/\n\n#Offensive_security\n\n1. RustiveDump - LSASS memory dumper using only NTAPIs\n\nhttps://github.com/safedv/RustiveDump\n\n2. cred1py - Python PoC for CRED1 over SOCKS5\n\nhttps://github.com/SpecterOps/cred1py\n\n3. Reverse SSH - SSH based reverse shell\n\nhttps://github.com/NHAS/reverse_ssh\n\nRepository for the NodeMedic-FINE tool (NDSS'24)\n\nhttps://github.com/NodeMedicAnalysis/NodeMedic-FINE\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-12T07:18:59.000000Z"}, {"uuid": "3bd3bf0d-ad01-4a2b-aa19-fe07ed509c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1060", "content": "Tools - Hackers Factory \n\n#exploit\n\n1. CVE-2024-20404: Cisco Finesse Web-Based Management Interface XSS/SSRF\n\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052: Exploiting Visual Studio via dump files\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353: Cisco IOS XE DoS\n\nhttps://github.com/codeb0ss/CVE-2\n\nThievingFox\n\nhttps://github.com/Slowerzs/ThievingFox/\n\n#Offensive_security\n\n1. RustiveDump - LSASS memory dumper using only NTAPIs\n\nhttps://github.com/safedv/RustiveDump\n\n2. cred1py - Python PoC for CRED1 over SOCKS5\n\nhttps://github.com/SpecterOps/cred1py\n\n3. Reverse SSH - SSH based reverse shell\n\nhttps://github.com/NHAS/reverse_ssh\n\nRepository for the NodeMedic-FINE tool (NDSS'24)\n\nhttps://github.com/NodeMedicAnalysis/NodeMedic-FINE\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-12T07:18:26.000000Z"}, {"uuid": "14290fb9-74c1-417d-b22c-323b231ea309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3790", "content": "Tools - Hackers Factory \n\n#exploit\n\n1. CVE-2024-20404: Cisco Finesse Web-Based Management Interface XSS/SSRF\n\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052: Exploiting Visual Studio via dump files\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353: Cisco IOS XE DoS\n\nhttps://github.com/codeb0ss/CVE-2\n\nThievingFox\n\nhttps://github.com/Slowerzs/ThievingFox/\n\n#Offensive_security\n\n1. RustiveDump - LSASS memory dumper using only NTAPIs\n\nhttps://github.com/safedv/RustiveDump\n\n2. cred1py - Python PoC for CRED1 over SOCKS5\n\nhttps://github.com/SpecterOps/cred1py\n\n3. Reverse SSH - SSH based reverse shell\n\nhttps://github.com/NHAS/reverse_ssh\n\nRepository for the NodeMedic-FINE tool (NDSS'24)\n\nhttps://github.com/NodeMedicAnalysis/NodeMedic-FINE\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-12T07:18:32.000000Z"}, {"uuid": "63abbe12-f7b4-4b02-8fdc-cb35d00f0c68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24064", "content": "Tools - Hackers Factory \n\n#exploit\n\n1. CVE-2024-20404: Cisco Finesse Web-Based Management Interface XSS/SSRF\n\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052: Exploiting Visual Studio via dump files\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353: Cisco IOS XE DoS\n\nhttps://github.com/codeb0ss/CVE-2\n\nThievingFox\n\nhttps://github.com/Slowerzs/ThievingFox/\n\n#Offensive_security\n\n1. RustiveDump - LSASS memory dumper using only NTAPIs\n\nhttps://github.com/safedv/RustiveDump\n\n2. cred1py - Python PoC for CRED1 over SOCKS5\n\nhttps://github.com/SpecterOps/cred1py\n\n3. Reverse SSH - SSH based reverse shell\n\nhttps://github.com/NHAS/reverse_ssh\n\nRepository for the NodeMedic-FINE tool (NDSS'24)\n\nhttps://github.com/NodeMedicAnalysis/NodeMedic-FINE\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-12T07:18:52.000000Z"}, {"uuid": "c34f36e6-59ff-41e1-a7b3-587bb1d20add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "Telegram/RwY6Qx7q79BGFkuYNtskNo4YfaA4RR8J0sppT16Si3kAhAp8", "content": "", "creation_timestamp": "2024-10-19T08:21:04.000000Z"}, {"uuid": "b7b7ba8a-3ebb-437a-9f5d-0cb97b01df7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/reverse_dungeon/3789", "content": "Exploiting AMD atdcm64a.sys arbitrary pointer dereference \u2013 Part 3\n\nLiving off Microsoft Copilot\n\nhunt down APTs\n\neBPF Crash Course for Beginners\n\nExploiting Visual Studio via dump files - CVE-2024-30052\n\nPowerShell Command History Forensics\n\nchill kernel hacking for fun\n\nSilently Install Chrome Extension For Persistence\n\nPopping Android Vulnerabilities From Notification to WebView XSS\n\nReverse Engineering Android Spyware ...with LaurieWired\n\n\u041c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b KLEE 2024 workshop (1,2)\n\nFuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments\n\nA collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID", "creation_timestamp": "2024-10-17T21:17:40.000000Z"}, {"uuid": "388bb8f0-033e-4b86-963f-2ab36539fbaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7512", "content": "Tools - Hackers Factory \n\n#exploit\n\n1. CVE-2024-20404: Cisco Finesse Web-Based Management Interface XSS/SSRF\n\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052: Exploiting Visual Studio via dump files\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353: Cisco IOS XE DoS\n\nhttps://github.com/codeb0ss/CVE-2\n\nThievingFox\n\nhttps://github.com/Slowerzs/ThievingFox/\n\n#Offensive_security\n\n1. RustiveDump - LSASS memory dumper using only NTAPIs\n\nhttps://github.com/safedv/RustiveDump\n\n2. cred1py - Python PoC for CRED1 over SOCKS5\n\nhttps://github.com/SpecterOps/cred1py\n\n3. Reverse SSH - SSH based reverse shell\n\nhttps://github.com/NHAS/reverse_ssh\n\nRepository for the NodeMedic-FINE tool (NDSS'24)\n\nhttps://github.com/NodeMedicAnalysis/NodeMedic-FINE\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-12T07:18:59.000000Z"}, {"uuid": "bb671683-4694-44ee-88c2-29ccbb3e09b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11248", "content": "#exploit\n1. CVE-2024-20404:\nCisco Finesse Web-Based Management Interface XSS/SSRF\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052:\nExploiting Visual Studio via dump files\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353:\nCisco IOS XE DoS\nhttps://github.com/codeb0ss/CVE-2024-20353-PoC", "creation_timestamp": "2024-10-07T18:09:24.000000Z"}, {"uuid": "354f0509-daac-48d0-a652-2dd7673ef5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9199", "content": "Exploiting Visual Studio via dump files - CVE-2024-30052\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files", "creation_timestamp": "2024-10-05T02:15:44.000000Z"}, {"uuid": "fb4af282-8fd7-410e-9748-fd3288bf1335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/CyberBulletin/25943", "content": "\u26a1\ufe0fExploiting Visual Studio via dump files - CVE-2024-30052.\n\n#CyberBulletin", "creation_timestamp": "2024-10-05T14:45:17.000000Z"}, {"uuid": "abc67ebb-fb3b-4db3-8f28-984e07e0eae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/S_E_Reborn/5168", "content": "Exploiting AMD atdcm64a.sys arbitrary pointer dereference \u2013 Part 3\n\nLiving off Microsoft Copilot\n\nhunt down APTs\n\neBPF Crash Course for Beginners\n\nExploiting Visual Studio via dump files - CVE-2024-30052\n\nPowerShell Command History Forensics\n\nchill kernel hacking for fun\n\nSilently Install Chrome Extension For Persistence\n\nPopping Android Vulnerabilities From Notification to WebView XSS\n\nReverse Engineering Android Spyware ...with LaurieWired\n\n\u041c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b KLEE 2024 workshop (1,2)\n\nFuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments", "creation_timestamp": "2024-10-14T18:06:17.000000Z"}, {"uuid": "06c53e6e-ae30-4421-a72f-6ab22087d5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/InfoSecInsider/495", "content": "Tools - Hackers Factory \n\n#exploit\n\n1. CVE-2024-20404: Cisco Finesse Web-Based Management Interface XSS/SSRF\n\nhttps://github.com/AbdElRahmanEzzat1995/CVE-2024-20404\n\n2. CVE-2024-30052: Exploiting Visual Studio via dump files\n\nhttps://ynwarcs.github.io/exploiting-vs-dump-files\n\n3. CVE-2024-20353: Cisco IOS XE DoS\n\nhttps://github.com/codeb0ss/CVE-2\n\nThievingFox\n\nhttps://github.com/Slowerzs/ThievingFox/\n\n#Offensive_security\n\n1. RustiveDump - LSASS memory dumper using only NTAPIs\n\nhttps://github.com/safedv/RustiveDump\n\n2. cred1py - Python PoC for CRED1 over SOCKS5\n\nhttps://github.com/SpecterOps/cred1py\n\n3. Reverse SSH - SSH based reverse shell\n\nhttps://github.com/NHAS/reverse_ssh\n\nRepository for the NodeMedic-FINE tool (NDSS'24)\n\nhttps://github.com/NodeMedicAnalysis/NodeMedic-FINE\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-12T07:18:53.000000Z"}]}