{"vulnerability": "CVE-2024-7479", "sightings": [{"uuid": "f718626b-2350-48e5-8697-6b2952bd4212", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1289/", "content": "", "creation_timestamp": "2024-09-26T05:00:00.000000Z"}, {"uuid": "f1c4364b-cea6-40c8-9b21-1279b1ffd779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13718", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481", "creation_timestamp": "2024-10-06T09:08:17.000000Z"}, {"uuid": "fe48aac0-df7a-408a-a8bd-c91c3ec44aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8669", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\nURL\uff1ahttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-04T06:29:25.000000Z"}, {"uuid": "12ad0c12-7e29-4d7c-b625-dbd3e9b2663b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "seen", "source": "https://t.me/HackingInsights/14316", "content": "\u200aTeamViewer Urges Users to Patch Privilege Escalation Flaws (CVE-2024-7479 and CVE-2024-7481)\n\nhttps://securityonline.info/teamviewer-urges-users-to-patch-privilege-escalation-flaws-cve-2024-7479-and-cve-2024-7481/", "creation_timestamp": "2024-09-26T11:07:51.000000Z"}, {"uuid": "7cf07cc5-a23c-4530-9fc5-e004c4479c22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "seen", "source": "https://t.me/cvedetector/6307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7479 - TeamViewer Remote Client Cryptographic Signature Verification Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-7479 \nPublished : Sept. 25, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : Improper verification of cryptographic signature during installation of a VPN driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T14:19:24.000000Z"}, {"uuid": "7eed4db7-d1a4-40b9-8823-cc5e5ac5491b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1793", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-08T16:16:11.000000Z"}, {"uuid": "ccb74b91-78d0-4941-95e6-2c97fb2b29ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/5254", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-08T16:16:08.000000Z"}, {"uuid": "b7bf5b57-9967-442b-8ca9-a8db50f42c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "seen", "source": "https://t.me/CyberBulletin/935", "content": "\u26a1\ufe0fTeamViewer Urges Users to Patch Privilege Escalation Flaws (CVE-2024-7479 and CVE-2024-7481).\n\n#CyberBulletin", "creation_timestamp": "2024-09-26T08:20:27.000000Z"}, {"uuid": "c6197d05-8bbc-4bd3-8f6b-6c81ec691723", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1651", "content": "TeamViewer \n*\nFrom User to Kernel Elevation of Privilege\n*\nCVE-2024-7479 \u0438 CVE-2024-7481\n*\nPOC exploit, \u0434\u0435\u0442\u0430\u043b\u0438, \u0432\u0438\u0434\u0435\u043e\n\n#\u043a\u0430\u0439\u0437\u0435\u0440\u0421\u043e\u0437\u044d", "creation_timestamp": "2024-10-04T23:34:23.000000Z"}, {"uuid": "461ec715-37e5-4400-8c5e-bf534b047088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3793", "content": "Tools - Hackers Factory \n\nMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR \n\nhttps://github.com/evild3ad/MemProcFS-Analyzer\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nGet PROXY List that gets updated everyday \n\nhttps://github.com/TheSpeedX/PROXY-List\n\nPrying Deep - An OSINT tool to collect intelligence on the dark web\n\nhttps://github.com/iudicium/pryingdeep\n\nA tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs. \n\nhttps://github.com/saw-your-packet/CloudShovel\n\nCVE-2024-45519\n\nhttps://github.com/p33d/CVE-2024-45519\n\nCVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13 \n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nGoogle &amp; Shodan Dorks for WebCam\n\nhttps://github.com/ExploitXpErtz/WebCam-Google-Shodan-Dorks\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-14T06:01:06.000000Z"}, {"uuid": "c500c228-573b-4d4d-bb13-b5be2dbe888d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2291", "content": "TeamViewer \n*\nFrom User to Kernel Elevation of Privilege\n*\nCVE-2024-7479 \u0438 CVE-2024-7481\n*\nPOC exploit, \u0434\u0435\u0442\u0430\u043b\u0438, \u0432\u0438\u0434\u0435\u043e\n\n#\u043a\u0430\u0439\u0437\u0435\u0440\u0421\u043e\u0437\u044d", "creation_timestamp": "2024-10-04T13:47:45.000000Z"}, {"uuid": "8c8f489e-3cdb-4005-82e1-9a5f5087345d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "seen", "source": "https://t.me/CyberBulletin/25815", "content": "\u26a1\ufe0fTeamViewer Urges Users to Patch Privilege Escalation Flaws (CVE-2024-7479 and CVE-2024-7481).\n\n#CyberBulletin", "creation_timestamp": "2024-09-26T08:20:27.000000Z"}, {"uuid": "2338ddb5-4964-47de-a3b5-2260fa0566cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}, {"uuid": "4aaae9a8-1994-43a6-b5b4-e1f5c1768090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1066", "content": "Tools - Hackers Factory \n\nMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR \n\nhttps://github.com/evild3ad/MemProcFS-Analyzer\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nGet PROXY List that gets updated everyday \n\nhttps://github.com/TheSpeedX/PROXY-List\n\nPrying Deep - An OSINT tool to collect intelligence on the dark web\n\nhttps://github.com/iudicium/pryingdeep\n\nA tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs. \n\nhttps://github.com/saw-your-packet/CloudShovel\n\nCVE-2024-45519\n\nhttps://github.com/p33d/CVE-2024-45519\n\nCVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13 \n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nGoogle &amp; Shodan Dorks for WebCam\n\nhttps://github.com/ExploitXpErtz/WebCam-Google-Shodan-Dorks\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-14T06:00:43.000000Z"}, {"uuid": "3ab8d8f8-987f-4ad0-a46d-bc5b57131f6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1069", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.\n\nGet PROXY List that gets updated everyday\n\nhttps://github.com/TheSpeedX/PROXY-List\n\nhttps://github.com/netlas-io/netlas-dorks\n\nHashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.\n\nhttps://github.com/balestek/hashtray\n\nCLI tool for saving complete web pages as a single HTML file\n\nhttps://github.com/Y2Z/monolith\n\nExtract endpoints from APK files\n\nhttps://github.com/ndelphit/apkurlgrep\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nPAM module may allow accessing with the credentials of another user\n\nhttps://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-21T08:40:51.000000Z"}, {"uuid": "3aabaafb-9a7f-4ab4-8235-d2741b70fb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15429", "content": "\u200aExploit Releases for TeamViewer Flaws (CVE-2024-7479 &amp; CVE-2024-7481) Let Unprivileged Users Load Arbitrary Kernel Drivers\n\nhttps://securityonline.info/exploit-releases-for-teamviewer-flaws-cve-2024-7479-cve-2024-7481-let-unprivileged-users-load-arbitrary-kernel-drivers/", "creation_timestamp": "2024-10-08T14:31:02.000000Z"}, {"uuid": "5da266b3-b04c-4a0d-a766-038503423d4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "Telegram/IpSkdng-DvuBirFh-8nYsY3OgxKRFd_quSrS72XmwTlTwLs", "content": "", "creation_timestamp": "2025-03-28T00:00:06.000000Z"}, {"uuid": "8b179ab2-8ea7-4801-910c-d8fa5f3cce2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3280", "content": "https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nTeamViewer User to Kernel Elevation of Privilege\n#github #tools #\u63d0\u6743", "creation_timestamp": "2024-10-05T14:07:43.000000Z"}, {"uuid": "3c75cfb2-15ad-4908-9849-673bf77e0e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11232", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-05T21:23:25.000000Z"}, {"uuid": "2af39255-fabe-43b4-b2c2-35088274c546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7515", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.\n\nGet PROXY List that gets updated everyday\n\nhttps://github.com/TheSpeedX/PROXY-List\n\nhttps://github.com/netlas-io/netlas-dorks\n\nHashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.\n\nhttps://github.com/balestek/hashtray\n\nCLI tool for saving complete web pages as a single HTML file\n\nhttps://github.com/Y2Z/monolith\n\nExtract endpoints from APK files\n\nhttps://github.com/ndelphit/apkurlgrep\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nPAM module may allow accessing with the credentials of another user\n\nhttps://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-21T08:41:23.000000Z"}, {"uuid": "1ab27962-1ded-44ef-a733-e30f5aa0e77e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3794", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.\n\nGet PROXY List that gets updated everyday\n\nhttps://github.com/TheSpeedX/PROXY-List\n\nhttps://github.com/netlas-io/netlas-dorks\n\nHashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.\n\nhttps://github.com/balestek/hashtray\n\nCLI tool for saving complete web pages as a single HTML file\n\nhttps://github.com/Y2Z/monolith\n\nExtract endpoints from APK files\n\nhttps://github.com/ndelphit/apkurlgrep\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nPAM module may allow accessing with the credentials of another user\n\nhttps://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-21T08:41:14.000000Z"}, {"uuid": "2432b1d8-b2c7-48c1-ab10-e41210c8cbdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24108", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.\n\nGet PROXY List that gets updated everyday\n\nhttps://github.com/TheSpeedX/PROXY-List\n\nhttps://github.com/netlas-io/netlas-dorks\n\nHashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.\n\nhttps://github.com/balestek/hashtray\n\nCLI tool for saving complete web pages as a single HTML file\n\nhttps://github.com/Y2Z/monolith\n\nExtract endpoints from APK files\n\nhttps://github.com/ndelphit/apkurlgrep\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nPAM module may allow accessing with the credentials of another user\n\nhttps://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-21T08:41:30.000000Z"}, {"uuid": "9d7d014c-9ed6-42c8-99b2-1ec2c2ecde6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8884", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.\n\nGet PROXY List that gets updated everyday\n\nhttps://github.com/TheSpeedX/PROXY-List\n\nhttps://github.com/netlas-io/netlas-dorks\n\nHashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.\n\nhttps://github.com/balestek/hashtray\n\nCLI tool for saving complete web pages as a single HTML file\n\nhttps://github.com/Y2Z/monolith\n\nExtract endpoints from APK files\n\nhttps://github.com/ndelphit/apkurlgrep\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nPAM module may allow accessing with the credentials of another user\n\nhttps://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-21T08:41:23.000000Z"}, {"uuid": "db334bcd-6e08-42fb-8819-9bfd58b976cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/88", "content": "https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nTeamViewer User to Kernel Elevation of Privilege\n#github #tools #\u63d0\u6743", "creation_timestamp": "2024-12-21T15:47:24.000000Z"}, {"uuid": "742dc3f2-3b5a-4cc2-a46c-0a50a105e4f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7479", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/498", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.\n\nGet PROXY List that gets updated everyday\n\nhttps://github.com/TheSpeedX/PROXY-List\n\nhttps://github.com/netlas-io/netlas-dorks\n\nHashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.\n\nhttps://github.com/balestek/hashtray\n\nCLI tool for saving complete web pages as a single HTML file\n\nhttps://github.com/Y2Z/monolith\n\nExtract endpoints from APK files\n\nhttps://github.com/ndelphit/apkurlgrep\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nPAM module may allow accessing with the credentials of another user\n\nhttps://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-21T08:41:30.000000Z"}]}