{"vulnerability": "CVE-2024-6769", "sightings": [{"uuid": "de0df599-42d5-4777-b749-3cc5f69a5770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "seen", "source": "MISP/ac18d72e-dbe1-4403-8fae-f60c8c9ccb51", "content": "", "creation_timestamp": "2024-11-22T11:07:14.000000Z"}, {"uuid": "a55d88ae-60b8-4be1-8a55-f80fd06a0fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4904", "content": "#exploit\n1. CVE-2024-45489:\nArc Browser RCE in JavaScript Boosts\nhttps://kibty.town/blog/arc\n\n2. CVE-2024-44623:\nBlind RCE issue(SPX-GC) in SPX-GC\nhttps://github.com/merbinr/CVE-2024-44623\n\n3. CVE-2024-6769:\nPoisoning the activation cache to elevate from medium to high integrity in Windows 10/11/Srv2019/Srv2022\nhttps://github.com/fortra/CVE-2024-6769", "creation_timestamp": "2024-10-02T16:38:47.000000Z"}, {"uuid": "e5841bff-3a20-4d74-adf2-1059b8e385ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8618", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)\nURL\uff1ahttps://github.com/fortra/CVE-2024-6769\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-27T16:18:40.000000Z"}, {"uuid": "42332308-8391-4e2b-8207-59d7442cc8e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8624", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)\nURL\uff1ahttps://github.com/paragbagul111/CVE-2024-33209\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-10T13:45:23.000000Z"}, {"uuid": "c77267e5-7709-4224-a912-34f16d4314a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24069", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:01.000000Z"}, {"uuid": "c0bf518f-dc66-4552-9c46-db6296a500cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1582", "content": "#exploit\n1. CVE-2024-45489:\nArc Browser RCE in JavaScript Boosts\nhttps://kibty.town/blog/arc\n\n2. CVE-2024-44623:\nBlind RCE issue(SPX-GC) in SPX-GC\nhttps://github.com/merbinr/CVE-2024-44623\n\n3. CVE-2024-6769:\nPoisoning the activation cache to elevate from medium to high integrity in Windows 10/11/Srv2019/Srv2022\nhttps://github.com/fortra/CVE-2024-6769", "creation_timestamp": "2024-10-02T16:38:48.000000Z"}, {"uuid": "73dd409b-4170-44ad-b69a-b05e3aee2d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1610", "content": "Elevating Privileges in Windows via Activation Cache Poisoning\n\nA deep dive into CVE-2024-6769, which leverages two chained bugs to escalate privileges from medium to high integrity. The first stage involves remapping the root drive, followed by a DLL hijacking exploit. The second stage poisons the Activation Cache through the CSRSS process to gain full administrator access.\n\nhttps://www.coresecurity.com/core-labs/articles/cve-2024-6769-poisoning-activation-cache-elevate-medium-high-integrity\n\nhttps://github.com/fortra/CVE-2024-6769", "creation_timestamp": "2024-09-29T12:48:05.000000Z"}, {"uuid": "4aaa1ba2-0cc0-45f7-8ff7-abeacd176f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "seen", "source": "https://t.me/cvedetector/6462", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6769 - Microsoft Windows DLL Hijacking Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-6769 \nPublished : Sept. 26, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T23:51:55.000000Z"}, {"uuid": "6e22a815-bad8-48b7-a890-ac5069a6d972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1063", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:50.000000Z"}, {"uuid": "ba0cfd47-5f43-43e2-b7ad-8236014535d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1011", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:02.000000Z"}, {"uuid": "f97d6272-e390-4434-8af0-8a486eed980b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8879", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:55.000000Z"}, {"uuid": "3aa4be3f-e8f1-4f82-b033-f92b23250ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8844", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:15.000000Z"}, {"uuid": "62ed0a26-3f04-4d79-b6ae-b5b886cb86a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23970", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:08.000000Z"}, {"uuid": "f1ae1611-d142-4a49-aa2f-70ef1615195c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3792", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling  \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/  \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark  \n\nScriptSentry finds misconfigured and dangerous logon scripts.  \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:42.000000Z"}, {"uuid": "a1dafbb0-eda3-4f2b-9b22-38b826626192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3773", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.  \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n \nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:22.000000Z"}, {"uuid": "0003f7bb-7a1f-4139-afc3-1ab077a3ca38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11202", "content": "#exploit\n1. CVE-2024-45489:\nArc Browser RCE in JavaScript Boosts\nhttps://kibty.town/blog/arc\n\n2. CVE-2024-44623:\nBlind RCE issue(SPX-GC) in SPX-GC\nhttps://github.com/merbinr/CVE-2024-44623\n\n3. CVE-2024-6769:\nPoisoning the activation cache to elevate from medium to high integrity in Windows 10/11/Srv2019/Srv2022\nhttps://github.com/fortra/CVE-2024-6769\n\n4. CVE-2024-45519: \nZimbra SMTP RCE\nhttps://blog.projectdiscovery.io/zimbra-remote-code-execution\n]-&gt; https://github.com/p33d/CVE-2024-45519", "creation_timestamp": "2024-11-01T03:20:06.000000Z"}, {"uuid": "41ca2f50-d3e1-4feb-8aef-464a2b9dd9cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7487", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:15.000000Z"}, {"uuid": "a00b4107-ae90-4ee8-bb5f-f3292054959c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7514", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:35:55.000000Z"}, {"uuid": "dc57fe7d-9058-4b96-b7a9-f233aa22436a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3237", "content": "https://github.com/fortra/CVE-2024-6769\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)\n#github #poc", "creation_timestamp": "2024-09-28T13:40:30.000000Z"}, {"uuid": "c9745166-0a2e-4129-9b44-03fdcf1f179f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/419", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:09.000000Z"}, {"uuid": "6a6661ca-5fc2-4998-8967-eb8795c8ef53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6769", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/496", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:02.000000Z"}]}