{"vulnerability": "CVE-2024-5830", "sightings": [{"uuid": "1f092c76-6fa6-4cd1-a74f-97578fdcb816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58307", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpgia7gt2c", "content": "", "creation_timestamp": "2025-12-11T23:17:23.597841Z"}, {"uuid": "0d0864a9-1db3-4005-b3e3-5618631f4cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58302", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpk2yl3q2m", "content": "", "creation_timestamp": "2025-12-11T23:19:24.300940Z"}, {"uuid": "312064c1-10b9-4bd5-9cbc-902f5b78d0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58303", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpnvwbve2o", "content": "", "creation_timestamp": "2025-12-11T23:21:32.976683Z"}, {"uuid": "401b64db-5cf4-4e65-8076-9b08c4930973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58308", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqascrhb2e", "content": "", "creation_timestamp": "2025-12-11T23:32:06.542390Z"}, {"uuid": "696f43f1-98af-47a8-a7d0-e627073f1389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58304", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqnic5ze2o", "content": "", "creation_timestamp": "2025-12-11T23:39:12.370348Z"}, {"uuid": "fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58309", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqv5vo3k2y", "content": "", "creation_timestamp": "2025-12-11T23:43:29.939062Z"}, {"uuid": "37c2ee5a-df98-41ad-a631-8cb48d98e2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qsbwdfmd2q", "content": "", "creation_timestamp": "2025-12-12T00:08:32.071581Z"}, {"uuid": "39455b36-ea19-4cd9-beba-fba7e512ed44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58305", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7sy6huv4x2y", "content": "", "creation_timestamp": "2025-12-12T20:59:18.537174Z"}, {"uuid": "b02c9f40-960a-42f6-998d-40034c859ca4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "Telegram/WPvCxx3ui9KkigoynuvpOxasy_LhM4F9O2G3Xs3Lgh5AwuY", "content": "", "creation_timestamp": "2024-08-18T23:07:03.000000Z"}, {"uuid": "41f0ccd1-5ba6-488d-b5a3-53adac38c5c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4116", "content": "#exploit\n1. CVE-2023-47253:\nQualitor &lt;=8.2 - RCE\nhttps://github.com/vnxdtzip/CVE-2023-47253\n\n2. CVE-2024-7339:\nInformation Leak in DVR devices\nhttps://github.com/RevoltSecurities/CVE-2024-7339\n\n3. CVE-2024-5830:\nFrom object transition to RCE in the Chrome renderer\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer", "creation_timestamp": "2024-09-22T04:47:11.000000Z"}, {"uuid": "32f32520-5782-404b-8062-9130a6cf412a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1097", "content": "#exploit\n1. CVE-2023-47253:\nQualitor &lt;=8.2 - RCE\nhttps://github.com/vnxdtzip/CVE-2023-47253\n\n2. CVE-2024-7339:\nInformation Leak in DVR devices\nhttps://github.com/RevoltSecurities/CVE-2024-7339\n\n3. CVE-2024-5830:\nFrom object transition to RCE in the Chrome renderer\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer", "creation_timestamp": "2024-09-22T04:47:11.000000Z"}, {"uuid": "9959064a-4407-46c3-af17-859026bf97f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/418", "content": "#exploit\n1. CVE-2023-47253:\nQualitor &lt;=8.2 - RCE\nhttps://github.com/vnxdtzip/CVE-2023-47253\n\n2. CVE-2024-7339:\nInformation Leak in DVR devices\nhttps://github.com/RevoltSecurities/CVE-2024-7339\n\n3. CVE-2024-5830:\nFrom object transition to RCE in the Chrome renderer\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer", "creation_timestamp": "2024-09-21T20:25:51.000000Z"}, {"uuid": "3cf33ef4-d7dc-4324-96cf-491fb6591ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1011", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:02.000000Z"}, {"uuid": "74d4a1c1-ccfa-4de4-8814-1187ee865271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1063", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:50.000000Z"}, {"uuid": "048948f6-0460-400d-9f00-e7e245836e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8879", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:55.000000Z"}, {"uuid": "8cb7d660-b904-4326-b3f7-4ce10421de26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24069", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:01.000000Z"}, {"uuid": "fe7027eb-03a7-4883-b386-919c21b1c482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23970", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:08.000000Z"}, {"uuid": "e64d6706-c9cc-425a-80c9-b7b99ee5fbda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3792", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling  \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/  \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark  \n\nScriptSentry finds misconfigured and dangerous logon scripts.  \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:42.000000Z"}, {"uuid": "7c761238-1af9-436e-9e82-838958583a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3773", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.  \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n \nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:22.000000Z"}, {"uuid": "35ca6d76-8008-4520-8cb7-d58d044ad545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7514", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:55.000000Z"}, {"uuid": "a552893b-231a-45c8-bd1d-15aa1ba6782c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7487", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:15.000000Z"}, {"uuid": "7291b8f3-1000-4b1c-b699-ff30686516d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11169", "content": "#exploit\n1. CVE-2023-47253:\nQualitor &lt;=8.2 - RCE\nhttps://github.com/vnxdtzip/CVE-2023-47253\n\n2. CVE-2024-7339:\nInformation Leak in DVR devices\nhttps://github.com/RevoltSecurities/CVE-2024-7339\n\n3. CVE-2024-5830:\nFrom object transition to RCE in the Chrome renderer\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer", "creation_timestamp": "2024-09-22T02:44:19.000000Z"}, {"uuid": "25a99229-3949-48d6-a0ce-f908caadc594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/419", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:09.000000Z"}, {"uuid": "eb2932a3-9b36-4876-af30-5dd489c3162d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/496", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:02.000000Z"}, {"uuid": "516b5c51-77c5-4f6c-9aaa-36b9ff96dfb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4491", "content": "#exploit\n1. CVE-2023-47253:\nQualitor &lt;=8.2 - RCE\nhttps://github.com/vnxdtzip/CVE-2023-47253\n\n2. CVE-2024-7339:\nInformation Leak in DVR devices\nhttps://github.com/RevoltSecurities/CVE-2024-7339\n\n3. CVE-2024-5830:\nFrom object transition to RCE in the Chrome renderer\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer", "creation_timestamp": "2024-09-22T12:58:13.000000Z"}]}