CVSS | |
---|---|
DESCRIPTION | Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291. |
HEAT SCORE | 3228 |
DATE | TWEETS | USER |
---|---|---|
2023-04-27 13:13:11 | Microsoft CVE-2021-42278 ve CVE-2021-42287: Active Directory Domain Services Elevation of Privilege Zafiyetleri… https://t.co/tJzJctAwka https://twitter.com/i/web/status/1651569863637311496 | cozumpark |
2023-02-24 05:30:46 | 从外网 log4j2 RCE 再到内网组合拳漏洞 CVE-2021-42287、CVE-2021-42278 拿到 DC - 渗透测试中心 https://t.co/NE3biwr1zl https://t.co/FW172jueA1 https://ift.tt/PJNaeSw https://ift.tt/Y6eoIN9 | buaqbot |
2022-12-04 14:49:48 | CVE-2021-42278、CVE-2021-42287への対応として、PacRequestorEnforcementが0は2022 年 10 月 11 日以降互換性がなくなるのか。TGTのPACに利用ユーザ情報が追加され、結果… https://t.co/lou3tbPU4o https://twitter.com/i/web/status/1599412377782743041 | number3to4 |
2022-10-12 00:26:36 | 利用CVE-2021-42278和CVE-2021-42287从标准域用户模拟 DA https://t.co/zywzAEgvwj https://t.co/IHZux1bDR6 https://ift.tt/3DNgjzl https://ift.tt/3RvCt14 | buaqbot |
2022-09-12 11:20:52 | noPac : Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/KVOVKsdqEs https://twitter.com/i/web/status/1569283160789114881 | PentestingN |
2022-09-10 13:16:01 | Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2021-42278: 338.9K (audience size) CVE-2021-42287: 338.9K CVE-2019… https://t.co/kApHopHO0R https://twitter.com/i/web/status/1568585092838162436 | CVEtrends |
2022-09-10 13:14:10 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/SAwyWTNwkY https://twitter.com/i/web/status/1568526705714933761 | ZeroDayCVE |
2022-09-10 12:56:10 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/SAwyWTNwkY https://twitter.com/i/web/status/1568526705714933761 | ZeroDayCVE |
2022-09-10 12:39:47 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/SAwyWTNwkY https://twitter.com/i/web/status/1568526705714933761 | ZeroDayCVE |
2022-09-10 10:22:10 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/FWWf5NuEmo #infosec https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | r3pek |
2022-09-09 15:20:19 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/1EiwO1uBQ7 https://twitter.com/i/web/status/1568247983942283265 | KitPloit |
2022-09-09 15:02:02 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/nUoPAAvILL https://twitter.com/i/web/status/1568249080761008128 | Chahali |
2022-09-08 14:12:47 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/Ki60cWLkKF https://twitter.com/i/web/status/1567876673684779009 | ptracesecurity |
2022-09-08 14:12:22 | Emerging Vulnerability Found CVE-2021-42278 - Active Directory Domain Services Elevation of Privilege Vulnerability… https://t.co/rWi07Tc00S https://twitter.com/i/web/status/1567876703589990405 | ColorTokensInc |
2022-09-08 11:30:08 | noPac - Exploiting CVE-2021-42278, CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/N7otJJZOz8 https://twitter.com/i/web/status/1567836290359431169 | cackerman1 |
2022-09-07 18:20:18 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/H9DJTsCLK7 https://twitter.com/i/web/status/1567574400936955907 | 0xbadad |
2022-09-07 17:21:31 | noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/JI3R62Vwxy https://twitter.com/i/web/status/1567561429678542851 | hack_git |
2022-09-07 15:32:50 | https://t.co/a1FpPLsiYP noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #cybersecurity https://professionalhackers.in/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | netsecu |
2022-09-07 13:05:54 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/JyEKVIugVr https://professionalhackers.in/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | PHackersIndia |
2022-09-07 13:00:40 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/DIFbSoDFkq http://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | Seven_Stones |
2022-09-07 12:50:51 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User – Professional Hac… https://t.co/WXaznWVVeh https://twitter.com/i/web/status/1567494754228740096 | BibsTech |
2022-09-07 10:37:40 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/AQ05rNtb1C http://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | Dinosn |
2022-09-07 10:32:03 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/y9OiPMBLoZ https://aeternusmalus.wordpress.com/2022/09/07/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | d34dr4bbit |
2022-09-07 09:30:15 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/19GohMFtSh https://twitter.com/i/web/status/1567444881961803779 | MnkeniFrancis |
2022-09-07 03:11:16 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security https://t.co/t2OW0lO0Lq https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | Necio_news |
2022-09-07 03:01:29 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/LTfXt8xD8r https://twitter.com/i/web/status/1567345119992365056 | StanleyEpstein |
2022-09-07 02:21:32 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/N3lGiI2lGc https://twitter.com/i/web/status/1567334884506476545 | corizance |
2022-09-07 02:00:10 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security https://t.co/zO0WMuYKCI https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | cybersecboardrm |
2022-09-06 22:25:35 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/906QgFXiHH https://twitter.com/i/web/status/1567275320486821889 | s0urc3c0d3err0r |
2022-09-06 19:47:04 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/P5BeO5O2LI https://twitter.com/i/web/status/1567231967812538368 | beingsheerazali |
2022-09-06 15:00:15 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Customary Domain User https://t.co/Dz4K2n8VQX https://un5t48l3.com/exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-customary-domain-user/ | UN5T48L3 |
2022-09-06 14:51:12 | r/t noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/66SU0goMay https://twitter.com/i/web/status/1567161214907842566 | profxeni |
2022-09-06 14:50:30 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/Z7YsWzpgc4 https://ift.tt/nzG4tBy | Asesores_Brito |
2022-09-06 14:31:30 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User | squadpirates |
2022-09-06 14:30:19 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/XWx2611bG3 https://ift.tt/rH19Vm3 | 3m1l |
2022-09-06 14:20:17 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/Sd6yTZd1uG https://twitter.com/i/web/status/1567154185807843330 | KitPloit |
2022-09-06 14:20:15 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/bUcjIcn6IZ https://twitter.com/i/web/status/1567154289591681027 | santosomar |
2022-09-06 14:20:11 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/Y8MHDFSU7m https://twitter.com/i/web/status/1567154562368258049 | Chahali |
2022-09-06 14:20:07 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/AFaYdHuMTc #Pentesting #tools https://ift.tt/vr56fPx | angelart07 |
2022-09-06 14:04:25 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/cFdqThvQSm https://twitter.com/i/web/status/1567148667877867522 | FilipiPires |
2022-09-06 13:42:27 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/vESkEDUTqB https://twitter.com/i/web/status/1567144677777760265 | oe0e0 |
2022-09-06 13:41:53 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/1uydZZfH3W https://twitter.com/i/web/status/1567144857097105408 | AcooEdi |
2022-09-06 13:22:29 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/5ZyeYxmSw9 https://twitter.com/i/web/status/1567138842825658368 | buaqbot |
2022-09-06 13:10:26 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/XLbhPUnyGH https://hacker-gadgets.com/blog/2022/09/06/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | OSINT_info |
2022-09-06 12:57:45 | https://t.co/bTc2mjoiYo noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #cybersecurity http://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | netsecu |
2022-09-06 12:43:27 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/mpUuHKF8Wv https://twitter.com/i/web/status/1567129505508249602 | cipherstorm |
2022-08-23 20:31:18 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Dy5xo2nnd5 https://t.co/EpDiunDv3M https://ift.tt/RbhqS9n https://ift.tt/w6xT4fd | buaqbot |
2022-06-20 13:21:04 | @DebugPrivilege - password in clear as comment on LDAP - CVE-2021-42287/CVE-2021-42278 from regular user (responder/relay) | crittico |
2022-05-25 17:00:28 | @nader_shalabi @gf_256 CVE-2021-42278 | aleph_sars |
2022-05-10 20:23:40 | eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IYhhJkeuZx https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | K3vinLuSec |
2022-04-27 14:42:48 | Yo @exploitph love your blog post on CVE-2021-42278 weaponisation. | myexploit2600 |
2022-04-14 01:16:05 | https://t.co/RJ6a9f55db The Microsoft issues - CVE-2021-42287 and CVE-2021-42278 - also concern privilege escal… https://t.co/867UH3OULJ https://therecord.media/cisa-adds-google-microsoft-and-qnap-bugs-to-exploited-vulnerabilities-list/ https://twitter.com/i/web/status/1514408986040156161 | eagerbeavertech |
2022-04-12 14:50:08 | Of the 8 new Vulns that @CISAgov added to their catalog, CVE-2021-42287 & CVE-2021-42278 related to AD privilege es… https://t.co/OwVDNRBayE https://twitter.com/i/web/status/1513892134939680771 | NeedPizzaNow |
2022-04-11 21:40:15 | The latest update for #CalComSoftware includes "CVE-2021-42278 SAM & CVE-2021-42287 KDC vulnerability" and "… https://t.co/ek4WDRmtMf https://twitter.com/i/web/status/1513632406116487176 | opsmatters_uk |
2022-04-08 19:20:29 | 📌 Atacantes utilizaron dos vulnerabilidades en Windows Server para elevar privilegios en la red: + CVE-2021-42278:… https://t.co/JEZisRPM9q https://twitter.com/i/web/status/1512509929659285512 | 1ZRR4H |
2022-04-06 21:30:48 | Good catch Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and we… https://t.co/9trI9l7XNE https://twitter.com/i/web/status/1511818340402032640 | SaidBisri |
2022-04-06 19:50:16 | Good catch 👌🏼 Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and w… https://t.co/UrTLArZRpB https://twitter.com/i/web/status/1511792939680288780 | 0xtornado |
2022-04-01 18:30:05 | Invoke-sAMSpoofing CVE-2021-42287/CVE-2021-42278 exploits in powershell https://t.co/28JJTNZhGq #infosec #CyberSecurity #bugbountytips https://github.com/XiaoliChan/Invoke-sAMSpoofing | Ksecureteamlab |
2022-03-19 21:40:04 | Fully automated CVE-2021-42278 and CVE-2021-42287 (NoPac) exploit that bypasses Defender/AMSI and dumps stored cred… https://t.co/b6cJtrgKpP https://twitter.com/i/web/status/1505298000146571264 | assume_breach |
2022-03-04 13:22:04 | noPac : CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter AD Domain admin exploit https://t.co/pDiUzvZMNi https://t.co/mSdKWMHEPn https://github.com/cube0x0/noPac | brianlinux |
2022-02-28 09:10:06 | ZeroDayLab | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/7eJrTo3u9l https://bit.ly/3hqdIKM | StopMalvertisin |
2022-02-11 15:30:20 | Exploiting the CVE-2021-42278 (sAMAccountName spoofing) and CVE-2021-42287 (deceiving the KDC) #ActiveDirectory vu… https://t.co/9agJw29Dfq https://twitter.com/i/web/status/1492154082160783361 | Olya_moskovchen |
2022-02-02 15:21:25 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/aVZoCZSWET https://github.com/WazeHell/sam-the-admin | JacobDjWilson |
2022-01-31 07:10:09 | CVE-2021-42278 Microsoft Active Directory Domain Services Elevation of Privilege... https://t.co/ywCEaPG9ef Vuln… https://t.co/rYAsG4wwGE http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-42278 https://twitter.com/i/web/status/1488046028133703680 | VulmonFeeds |
2022-01-27 10:32:13 | “60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287” https://t.co/YVSK5W0ln5 https://htn.to/rojsYKAi4o | waiha8 |
2022-01-27 07:44:11 | ブログ | 60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287 https://t.co/tZCdXnU9oB https://ftnt.net/6014KyZtI | FortinetJapan |
2022-01-18 07:14:33 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/lCPpRAyLMw #infosec #pentest #bugbounty @Dinosn https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | beingsheerazali |
2022-01-18 05:10:49 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Xp2LPb8zfA https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Dinosn |
2022-01-17 06:50:29 | Microsoft recently published two critical CVEs related to Active Directory (CVE-2021-42278 and CVE-2021-42287), whi… https://t.co/Nx9B0T2rzd https://twitter.com/i/web/status/1482966595915816961 | TowardsCybersec |
2022-01-14 18:40:35 | noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/AfddOnyXMn https://twitter.com/i/web/status/1482058989340925956 | hack_git |
2022-01-13 13:42:38 | Adversarial #CVE Targeting - CVE-2021-42278 & CVE-2021-42287 Discussion is less about two CVEs & more about patchi… https://t.co/nxVgSaZOUg https://twitter.com/i/web/status/1481619676455223297 | y_advintel |
2022-01-11 09:51:51 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/61AxgCLWZ3 https://twitter.com/i/web/status/1480837463044206602 | ChrisRobertsSec |
2022-01-10 22:50:09 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/sgdIntLAjt https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.Ydy3O0DdfaM.twitter | DennisFernandes |
2022-01-10 21:40:17 | Excited to share our research and detection on the CVE-2021-42278 and CVE-2021-4487 Kerberos vulnerabilities with… https://t.co/uEIjUDGBsO https://twitter.com/i/web/status/1480655530548944907 | stavsetty |
2022-01-10 17:41:39 | “From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs” https://t.co/F6Pucwelhl https://htn.to/4sKT8teGqE | waiha8 |
2022-01-10 17:41:08 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/RpLG1fXHd0 https://twitter.com/i/web/status/1480594127687409673 | SDCarter10 |
2022-01-10 14:10:08 | Learn how @cortexbypanw XDR detects the Kerberos noPac vulnerabilities - CVE-2021-42278 and CVE-42287… https://t.co/UxUBhLknrf https://twitter.com/i/web/status/1480539964421066755 | cortexbypanw |
2022-01-10 11:30:11 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs… https://t.co/7fSFSxh91k https://twitter.com/i/web/status/1480499899355607050 | DominikGeimer |
2022-01-10 07:10:26 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2022-01-09 13:00:21 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/hznYOYVW6L https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | lalit_1985 |
2022-01-09 08:20:06 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/MWVV2kvWiS https://twitter.com/i/web/status/1480091093509234692 | Scheehan |
2022-01-07 12:40:39 | The Windows Active Directory Domain Services (AD DS) escalation vulnerability (CVE-2021-42287 and CVE-2021-42278 co… https://t.co/AwxlUFm12C https://twitter.com/i/web/status/1479431078532169729 | sunnynehrabro |
2022-01-07 12:10:25 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/3AJdxx7XQn https://twitter.com/i/web/status/1479423355476402180 | gagjunior |
2022-01-07 10:00:03 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/DVXNRpNAUj https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.YdgOc6e55fA.twitter | GeeKo0 |
2022-01-07 07:00:21 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/ufajZULr4T https://twitter.com/i/web/status/1479345987948879875 | kathleenb03 |
2022-01-06 23:53:34 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/kfVjmUjNX3 https://twitter.com/i/web/status/1479237303289761798 | W_Gartner |
2022-01-06 19:23:45 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/GwFmuoopOl… https://t.co/pEHifW78Ys https://buff.ly/3HDQZG8 https://twitter.com/i/web/status/1479168906048815104 | NcuIsao |
2022-01-06 18:54:17 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/8M0rfnPohr https://twitter.com/i/web/status/1479161583553159173 | dkBrianAndersen |
2022-01-06 14:20:08 | Vom Benutzer zum Domänenadministrator in 60 Sekunden: : CVE-2021-42278/CVE-2021-42287 In diesem Beitrag beschreibe… https://t.co/J7o6NyDfdP https://twitter.com/i/web/status/1479095243123281924 | ThorstenHenning |
2022-01-06 11:30:09 | CVE-2021-42278 and CVE-2021-42287 Exploits are Shared #Exploit #darkweb https://t.co/XS8aEXb2Fe | cyberguideme |
2022-01-06 08:50:04 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/SPMK9Fc5X4 https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | Secnewsbytes |
2022-01-06 03:30:18 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/IlHg6RR5pr https://twitter.com/i/web/status/1478929422912831491 | mdfaridulalam |
2022-01-06 02:20:35 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/wzYzGFxkkk https://twitter.com/i/web/status/1478912037480771587 | gabrielauyong |
2022-01-06 00:10:31 | #FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analys… https://t.co/fRQTRr24Il https://twitter.com/i/web/status/1478879238438764544 | FortiGuardLabs |
2022-01-05 21:30:04 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/2KI7a328cZ https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | axcheron |
2022-01-05 19:10:10 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/btn7cRC6Mg https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | Whitehead4Jeff |
2022-01-04 23:00:23 | On tonight's #AttackOnTuesday, we're going after a domain controller, using the noPAC CVE-2021-42287/CVE-2021-42278… https://t.co/mCL4Whhwde https://twitter.com/i/web/status/1478499506186440705 | mttaggart |
2022-01-04 10:10:05 | CVE-2021-42287/CVE-2021-42278 Weaponisation、T... 这就是今日安全热帖! https://t.co/khbQmSYHkj https://t.co/jz8y5A4Gmn https://ift.tt/3HDayyr https://ift.tt/3FVDgtE | buaqbot |
2022-01-04 07:10:34 | I've just finished the 'CVE-2021-42287/CVE-2021-42278 Weaponisation' blog post done by @exploitph the blog was high… https://t.co/UwpRCmuJJ8 https://twitter.com/i/web/status/1478261116316880898 | Nimrodinger1 |
2022-01-01 07:40:14 | All computer accounts usually have a trailing $ in their sAMAccountName attribute. CVE-2021-42278 can be leveraged… https://t.co/ebPrqeWcPd https://twitter.com/i/web/status/1477180473097007112 | CswWorks |
2021-12-31 10:30:22 | @redteamlounge CVE-2021-42278 and Log4Shell were the worst. I am not sure which one is worse tho lol | d4rckh |
2021-12-30 23:30:54 | @cyb3rops Can we talk about noPac tho ? (CVE-2021-42278 and CVE-2021-42287) It's crazy how it's not getting the exposure it needs ! | meriem_laroui |
2021-12-29 17:00:06 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio… https://t.co/5DmdVlPIFB https://twitter.com/i/web/status/1476235470862307328 | AEtchegoncelay |
2021-12-29 09:28:02 | 域内提权漏洞CVE-2021-42287与CVE-2021-42278原理分析 https://t.co/6W5383REnB https://t.co/nXBGyHwOSA https://ift.tt/3ED2prV https://ift.tt/3pANyK3 | buaqbot |
2021-12-28 09:00:12 | 2 @Microsoft Active Directory Bugs: CVE-2021-42287 & CVE-2021-42278, can be chained to gain privileges that lead to… https://t.co/vDhsHbyjTM https://twitter.com/i/web/status/1475751544163295235 | CswWorks |
2021-12-27 08:40:42 | Windows AD privilege escalation #PrivilegeEscalation #CVE-2021-42278 #Scanning #Exploitation #Windows #Hacking #AD… https://t.co/3I2lCwu3si https://twitter.com/i/web/status/1475384865562447874 | steiner254 |
2021-12-26 18:40:33 | 🔹 این باگها که دارای شناسههای CVE-2021-42287 و CVE-2021-42278 هستند، توسط اندرو بارلت (Andrew Bartlett) از شرکت ک… https://t.co/02Amu22zsp https://twitter.com/i/web/status/1475172092035452932 | semcert |
2021-12-25 17:50:07 | CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/MmBtGbvmI0 https://twitter.com/i/web/status/1474799254099083272 | ksg93rd |
2021-12-25 16:02:27 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/kqu93SbBiU #InfoSec #CyberSecurity #Security #Microsoft… https://t.co/rwKvSE5h1Q https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html https://twitter.com/i/web/status/1474771426494267396 | s3xcur1ty |
2021-12-23 20:40:10 | Hoy en #CiberAlertas_EcuCERT: Microsoft, para 2 vulnerabilidades, CVE-2021-42287 y CVE-2021-42278; "vulnerabilidad… https://t.co/AyRkfv8TRt https://twitter.com/i/web/status/1474115482047463437 | EcuCERT_EC |
2021-12-23 19:26:22 | NEW BLOG 🚨 @elad_shamir takes a look behind the scenes of CVE-2021-42278 and CVE-2021-42287 and offers a couple of… https://t.co/m7FiH6urly https://twitter.com/i/web/status/1474096648120844292 | SemperisTech |
2021-12-23 18:02:33 | Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/EA5qLV3t6q https://twitter.com/i/web/status/1474076077609959425 | ksg93rd |
2021-12-23 15:22:42 | ثغره تسمح للمخترق تصعيد صلاحياته لدومين ادمن بسهوله في انظمه ويندوز CVE-2021-42287: KDC bamboozling CVE-2021-42278… https://t.co/MLWSbxAjIJ https://twitter.com/i/web/status/1474036583443705858 | buhaimedi |
2021-12-23 15:02:56 | Microsoft waarschuwt dat voor de twee kwetsbaarheden ( CVE-2021-42287 / CVE-2021-42278) exploit code beschikbaar we… https://t.co/PSVizkxpJz https://twitter.com/i/web/status/1474031006743150592 | commandline_be |
2021-12-23 11:00:18 | noPac - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/LHVzrhKtS0 http://github.com/Ridter/noPac | pythontrending |
2021-12-23 09:30:14 | CVE-2021-42287/CVE-2021-42278はVBScriptで実現できないか軽く調べたけどS.DS.Pを触るのにいろいろ苦労がありそうなので妥協してPowerShellで再発明したという話がな...(遠い目 | nknskn |
2021-12-22 22:41:15 | HackGit noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admi… https://t.co/6D67r9B54H https://twitter.com/i/web/status/1473784443269693445 | hack_git |
2021-12-22 18:32:02 | CVE-2021-42278とCVE-2021-42287 の2つを組み合わせることで、通常のドメインユーザからdomain adminに権限昇格させられる…。PoCも出てます。 / Active Directory Bugs C… https://t.co/RqSHVKvguk https://twitter.com/i/web/status/1473719815202574336 | wakatono |
2021-12-22 17:44:28 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio (vía @hackplayers) https://t.co/b1ZovEGD9C https://buff.ly/32ePbnZ | lordman1982 |
2021-12-22 17:23:38 | #PatchNow KB5008102—Active Directory Security Accounts Manager hardening changes (CVE-2021-42278) KB5008380—Auth… https://t.co/tsvatgXbHg https://twitter.com/i/web/status/1473702399374151684 | JRCRASH |
2021-12-22 16:31:14 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/ipxXXC3LHu https://twitter.com/i/web/status/1473690441732304909 | YourAnonRiots |
2021-12-22 16:00:29 | ⚠️ Microsoft advierte que dos vulnerabilidades reportadas recientemente (CVE-2021-42278 y CVE-2021-42287) en Active… https://t.co/fEBNonFzXr https://twitter.com/i/web/status/1473683256692416519 | jpcarsi |
2021-12-22 15:11:07 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-12-22 15:00:40 | Компания Microsoft предупредила клиентов о двух уязвимостях повышения привилегий ( CVE-2021-42287 и CVE-2021-42278… https://t.co/WZnEp9rJ9x https://twitter.com/i/web/status/1473667492413386757 | infosecmedia_ |
2021-12-22 14:00:08 | Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2021-42287: 1.4M (audience size) CVE-2021-42278: 1.4M CVE-2021-442… https://t.co/aRBqxXlP5I https://twitter.com/i/web/status/1473654564939309057 | CVEtrends |
2021-12-22 13:10:06 | Вышедший в свет PoC для CVE-2021-42287 и CVE-2021-42278 вызывает большую обеспокоенность у разработчиков и клиентов… https://t.co/KggkJ9KRIK https://twitter.com/i/web/status/1473641846723252228 | IT_news_for_all |
2021-12-22 12:40:13 | A great blog post with some hunting ideas CVE-2021-42278 & CVE-2021-42287. @exploitph #ThreatHunting #BlueTeam… https://t.co/WubQlwuJHM https://twitter.com/i/web/status/1473632658366287883 | Oran_Yitzhak |
2021-12-22 12:30:18 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/7XfjdAgCKl https://twitter.com/i/web/status/1473630649772822530 | security_wang |
2021-12-22 10:30:06 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/83S112fAVz https://twitter.com/i/web/status/1473600450419064833 | unix_root |
2021-12-22 10:20:22 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/bkJTjlP4l6 https://github.com/WazeHell/sam-the-admin | p0p0pr3t |
2021-12-22 09:40:09 | By combining CVE-2021-42278 and CVE-2021-42287 #privilegeescalation to domain administrator is possible. #Patch now… https://t.co/o787i7a8Z3 https://twitter.com/i/web/status/1473588535726952448 | istrosec |
2021-12-22 08:30:19 | PoC released for CVE-2021-42278 & CVE-2021-42287 patches were released by MS in November. Could lead to domain take… https://t.co/Cze8X3qezu https://twitter.com/i/web/status/1473570248318238721 | sailingbikeruk |
2021-12-22 08:30:17 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/9CKSwEZYsy https://twitter.com/i/web/status/1473570251463749632 | Swati_THN |
2021-12-22 08:30:04 | #Microsoft warns that two recently reported #vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/mjxWmveEq2 https://twitter.com/i/web/status/1473571480550182914 | AntiVirusLV |
2021-12-22 08:20:21 | Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/C4iUY9SUqS https://twitter.com/i/web/status/1473567766904983562 | mis_config |
2021-12-22 08:10:43 | Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/zt0cPFZB8J https://twitter.com/i/web/status/1473566261288259588 | mis_config |
2021-12-22 08:00:18 | Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/bdATOwBSgh https://twitter.com/i/web/status/1473562350900822018 | Osmanjohn10 |
2021-12-22 07:21:45 | "#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/8oKaqHHJCh https://twitter.com/i/web/status/1473551969386127363 | trip_elix |
2021-12-22 07:17:45 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/8Z23f6EyXu https://twitter.com/i/web/status/1473549601525272581 | TheHackersNews |
2021-12-22 07:16:11 | @TheHackersNews: #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Active… | McMcgregory |
2021-12-22 05:30:16 | 今度は CVE-2021-42278 と CVE-2021-42287 か。次から次へと仕事に割り込んでくる。これも一種のDoS攻撃だなあ。 | kkakinuma |
2021-12-21 22:11:12 | SAM Name impersonation. Patch now. A POC leveraging CVE-2021-42287 and CVE-2021-42278 publicly disclosed https://t.co/ijXrWXxDfS https://techcommunity.microsoft.com/t5/security-compliance-and-identity/sam-name-impersonation/ba-p/3042699 | rodtrent |
2021-12-21 21:25:36 | GitHub - ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/tX3WY2EGzz https://github.com/ricardojba/noPac | n0ipr0cs |
2021-12-21 21:14:49 | Fantastic work by exploit[.]ph on their CVE-2021-42287/CVE-2021-42278 Weaponisation post. One thing I didn't see in… https://t.co/98RJrG389w https://twitter.com/i/web/status/1473399255209545736 | TactiKoolSec |
2021-12-21 14:23:47 | "Tracked as CVE-2021-42287 and CVE-2021-42278, the two security errors can be chained to impersonate domain control… https://t.co/h3aPDZqMrJ https://twitter.com/i/web/status/1473295979764142081 | ohhara_shiojiri |
2021-12-21 13:41:54 | #Microsoft reminding you to patch two vulnerabilities, CVE-2021-42287 and CVE-2021-42278, from its November… https://t.co/oLiFEkiaYl https://twitter.com/i/web/status/1473286646737121282 | LindseyOD123 |
2021-12-21 11:01:47 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/YH5cu5DnwR #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc0ve/cve202142287cve202142278_scanner_exploiter_fork/ | r_redteamsec |
2021-12-21 10:51:10 | Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter… https://t.co/IdoIMhb1KS https://twitter.com/i/web/status/1473242228470398977 | AcooEdi |
2021-12-21 10:51:05 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/un7VWhWBMZ https://t.co/hQHZatLZZp http://dlvr.it/SFmwKk | AcooEdi |
2021-12-21 10:40:08 | Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter https://t.co/OZTFx3P93G #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc046/powershell_net_assembly_loader_for_the/ | r_redteamsec |
2021-12-21 07:20:14 | Microsoft brīdina par to, ka novembrī izlabotie caurumi CVE-2021-42287 un CVE-2021-42278 kopā ļauj iegūt Active Dir… https://t.co/A2xjVygbgC https://twitter.com/i/web/status/1473190346326691843 | caurumi |
2021-12-21 04:24:03 | 11月のADの脆弱性(CVE-2021-42287、CVE-2021-42278)についてMSが警告。 2つの脆弱性組み合わせると容易にドメイン奪取可能で、12/11にPoCがTwitterとGitHubで拡散とな Micros… https://t.co/T048fFsE4o https://twitter.com/i/web/status/1473136310282252291 | test_user_css |
2021-12-20 21:51:27 | Windows AD privilege escalation #PrivilegeEscalation #CVE-2021-42278 #Scanning #Exploitation #Windows #Hacking #AD… https://t.co/rlXU8d6wht https://twitter.com/i/web/status/1473046336249417736 | NormanOre |
2021-12-20 11:00:16 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/1WJhYJzdGk https://github.com/ricardojba/noPac | AlexaChenowith |
2021-12-20 10:10:22 | #Обучение От пользователя домена до прав админа: CVE-2021-42278, CVE-2021-42287... https://t.co/bAZgIFB3en https://t.co/PKZzTBTnYW https://t.me/s/it_news_for_all/37268 | IT_news_for_all |
2021-12-20 05:01:10 | 解析CVE-2021-42287与CVE-2021-42278 https://t.co/GyFzj1mqI2 https://t.co/JqJLmf9pwm https://ift.tt/3EbY12E https://ift.tt/3EbXYE0 | buaqbot |
2021-12-19 15:23:41 | Windows AD privilege escalation #PrivilegeEscalation #CVE-2021-42278 #Scanning #Exploitation #Windows #Hacking #AD… https://t.co/IwbWFTezoE https://twitter.com/i/web/status/1472586681664434177 | reconshell |
2021-12-19 15:13:51 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-12-19 12:00:54 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/UeGsADhrDl https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | n0ipr0cs |
2021-12-18 15:50:06 | sAMAccountName spoofing (CVE-2021-42278, CVE-2021-42287) be like #log4j https://t.co/XaRaz94vcz | _nwodtuhs |
2021-12-18 11:00:52 | CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/JL8MQuAbqV https://twitter.com/i/web/status/1472158868390174727 | n0ipr0cs |
2021-12-18 09:20:14 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/19UL9qdpMt https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | jcgarciagamero |
2021-12-18 08:21:51 | 動くやん!(CVE-2021-42287/CVE-2021-42278のps1 PoC | nknskn |
2021-12-18 02:13:32 | Numerous public proof-of-concept exploits reveal that the #noPac vulnerabilities (CVE-2021-42278 and CVE-2021-42287… https://t.co/vbluBbT2mp https://twitter.com/i/web/status/1472024536400891904 | Cyber_O51NT |
2021-12-18 01:02:48 | Hot off the press @Secureworks blog on the noPac #vulnerability, CVE-2021-42278 and CVE-2021-42287 #noPac… https://t.co/dkaDlxU9q5 https://twitter.com/i/web/status/1472006661078495238 | marcellelee |
2021-12-17 17:21:21 | Hunting Tip: A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) hunting. Looking… https://t.co/eg0nE2h9Wz https://twitter.com/i/web/status/1471892357209595909 | Mahdi_htm |
2021-12-17 13:11:49 | [HackTip ⚒] A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) controlled exploit… https://t.co/3aD6t0HKuT https://twitter.com/i/web/status/1471829627765239816 | snovvcrash |
2021-12-17 10:15:33 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/UUU95yvKQJ https://github.com/Ridter/noPac | BTshell |
2021-12-17 06:45:38 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/hrbqDA2dAb https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | jccall80 |
2021-12-17 05:50:04 | @LitMoose @brdpoker Especially since CVE-2021-42278 and CVE-2021-42287 would make an attack on krbtgt way easier th… https://t.co/7gDULFwGh1 https://twitter.com/i/web/status/1471719303703633924 | fabian_bader |
2021-12-17 02:42:09 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/xXA4ob6NhM http://dlvr.it/SFX8jy | hacktivos |
2021-12-17 01:51:18 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/dzVlWD1mex https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | hackplayers |
2021-12-17 01:40:12 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/nxfVhT5p9s https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | security_inside |
2021-12-16 19:05:01 | While the world is chasing #log4j, don't forget to also patch your Domain Controllers for CVE-2021-42278 which allo… https://t.co/RIMCv3F6yt https://twitter.com/i/web/status/1471552718061850631 | Horizon3Attack |
2021-12-16 18:30:37 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-12-16 14:34:49 | cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security via… https://t.co/yS2S1pRhWW https://twitter.com/i/web/status/1471485420601024513 | MnkeniFrancis |
2021-12-16 14:12:17 | CVE-2021-42287/CVE-2021-42278 #Scanner & #Exploiter #CTI #DFIR #IncidentResponse https://t.co/OaHs13LcHW #DFIR #IncidentResponse https://github.com/ricardojba/noPac | AcademicoCert |
2021-12-16 14:02:02 | cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security https://t.co/RAnxlsM2oY https://github.com/cube0x0/noPac | cybersecboardrm |
2021-12-16 13:22:06 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/cPrLXgylOU #infosec… https://t.co/JhJ5hgI985 https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/ https://twitter.com/i/web/status/1471467908496650242 | beingsheerazali |
2021-12-16 13:21:17 | GitHub – ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rGKpKU9L4Y https://aeternusmalus.wordpress.com/2021/12/16/github-ricardojba-nopac-cve-2021-42287-cve-2021-42278-scanner-exploiter/ | d34dr4bbit |
2021-12-16 13:01:05 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/Amqp0qSrru https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/ | Dinosn |
2021-12-16 13:00:31 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. via /r/netsec… https://t.co/KZ3gfEnqeb https://twitter.com/i/web/status/1471465019632144385 | CybrXx0 |
2021-12-16 12:50:16 | New post: "CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements." https://t.co/zmt4Udie8G https://ift.tt/3IUBIlK | Myinfosecfeed |
2021-12-16 12:20:50 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/ewQnMS8Seb https://github.com/ricardojba/noPac | _r_netsec |
2021-12-16 12:20:25 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/A42eDnKGLx #infosec… https://t.co/DnHl11f9CQ https://github.com/ricardojba/noPac https://twitter.com/i/web/status/1471454258780250113 | beingsheerazali |
2021-12-16 10:50:32 | Pachine - Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation) https://t.co/ovz1cP8cN5 http://github.com/ly4k/Pachine | pythontrending |
2021-12-15 23:31:48 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/sgNKSizo52 #Pentesting #CVE #Exploit… https://t.co/MR9zqYrGN9 https://github.com/cube0x0/noPac https://twitter.com/i/web/status/1471260965408813063 | ptracesecurity |
2021-12-15 21:10:21 | eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Securityblog |
2021-12-15 13:24:52 | @Oran_Yitzhak Don't see that it includes the noPac vulns (CVE-2021-42287 and CVE-2021-42278) 😒. I guess let's wait for exploit Wednesday. | MalFuzzer |
2021-12-15 11:14:57 | CVE-2021-42278 - Microsoft / Windows - Privilege escalation - https://t.co/wPb4fHn1TT #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42278-microsoft-windows-privilege-escalation/ | RedPacketSec |
2021-12-15 08:18:35 | HackGit Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows… https://t.co/VG3t6z0ZOo https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1471029593964433411 | hack_git |
2021-12-15 04:23:49 | #Red_Team_Tactics Exploiting CVE-2021-42278/CVE-2021-42287 to impersonate DA from standard domain user https://t.co/kwSWpWEoyj https://github.com/WazeHell/sam-the-admin | ksg93rd |
2021-12-15 02:22:25 | Writing profiling logic for CVE-2021-42287/CVE-2021-42278 weaponization…This one is interesting! See below for sign… https://t.co/rXwO4NpeRl https://twitter.com/i/web/status/1470939648474157062 | MongolCyber |
2021-12-14 23:11:44 | 📦 noPac ⭐ 791 (+121) 🗒 C# CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/XkZidi1GMe https://github.com/cube0x0/noPac | gh_trending_ |
2021-12-14 22:26:48 | 📦 sam-the-admin 👤 @safe_buffer ⭐ 377 (+135) 🗒 Python Exploiting CVE-2021-42278 and CVE-2021-42287 t... https://t.co/gOlU99CHzn https://github.com/WazeHell/sam-the-admin | gh_trending_ |
2021-12-14 22:01:02 | Varsel! 🟡KRITIKALITET: Øget risiko (Gul)🟡 CVE-2021-42278 og CVE-2021-42287 "Sam-the-admin" scriptet kan udnytte s… https://t.co/JKexv3yMas https://twitter.com/i/web/status/1470871803690205190 | DCIS_SUND |
2021-12-14 15:55:30 | GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/4xlNM3fbyb https://twitter.com/i/web/status/1470781855112826888 | NeobeePaul |
2021-12-14 15:19:09 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-12-14 13:53:51 | To all my hard at work cyber defenders, do not neglect #CVE-2021-42278 and #CVE-2021-42287, patch your domain controllers. | zertux6 |
2021-12-14 12:01:08 | CVE-2021-42278 and CVE-2021-42287 critical for domain controllers, exploits POC. Please follow MS Guidance https://t.co/20MZwAoiSl https://support.microsoft.com/en-us/topic/kb5008380-authentication-updates-cve-2021-42287-9dafac11-e0d0-4cb8-959a-143bd0201041 | driekdesmet |
2021-12-14 11:44:58 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rAeRBM8JnM https://github.com/cube0x0/noPac | n0ipr0cs |
2021-12-14 11:44:01 | GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/xeYs1rAAeN https://twitter.com/i/web/status/1470719503344582664 | n0ipr0cs |
2021-12-14 11:40:26 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/tMkU3EJoer https://github.com/WazeHell/sam-the-admin | axcheron |
2021-12-14 11:32:14 | sam-the-admin - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/Fn3xCTldxC http://github.com/WazeHell/sam-the-admin | pythontrending |
2021-12-14 10:36:29 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/DB5yRTcEOP https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/ | Dinosn |
2021-12-14 10:35:12 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/NZa8keKRsK… https://t.co/wlXaBFfqNQ https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/ https://twitter.com/i/web/status/1470701134977245193 | beingsheerazali |
2021-12-14 10:34:37 | GitHub – WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/D8C9d5NpCF https://twitter.com/i/web/status/1470701262555516932 | d34dr4bbit |
2021-12-14 08:20:27 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/sfoLkvdTOy… https://t.co/2auz6KU8HK https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470669556242735107 | beingsheerazali |
2021-12-14 08:20:15 | Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/IoJ1huptoj #infosec #pentest #bugbounty RT @_r_netsec https://github.com/ricardojba/Invoke-noPac | beingsheerazali |
2021-12-14 07:50:07 | New post: "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user" https://t.co/0E5jAu0W59 https://ift.tt/3oSUIsR | Myinfosecfeed |
2021-12-14 07:20:34 | (CVE-2021-42287, CVE-2021-42278) gave me an easy domain compromise on this pentest. Big yikes. Patch your machines people! | FreeZeroDays |
2021-12-14 07:01:13 | In case you missed it… Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/SoAi4e8Sd1 https://twitter.com/i/web/status/1470647614618185729 | 0xdea |
2021-12-14 07:00:24 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/rpxiV3SYBe https://github.com/WazeHell/sam-the-admin | _r_netsec |
2021-12-14 07:00:07 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user via /r/netsec… https://t.co/XvTqxCwuZk https://twitter.com/i/web/status/1470649568912150528 | CybrXx0 |
2021-12-14 05:01:34 | Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation) ✅ #coding #dev #developer… https://t.co/RFBRZffRqU https://twitter.com/i/web/status/1470618497659113478 | Python_News |
2021-12-14 04:08:20 | @cjenks6 @Laughing_Mantis I agree. CVE-2021-42278 points to KB5007206 for the Server 2019 patch. KB5008602 appears… https://t.co/GlMTqBCY2R https://twitter.com/i/web/status/1470602776942157824 | Brunzwick2 |
2021-12-14 01:14:47 | “Samir on Twitter: "detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278… https://t.co/PM6g5NLzXE https://twitter.com/i/web/status/1470560620110282753 | waiha8 |
2021-12-13 23:55:55 | Python implementation for CVE-2021-42278. From a regular domain user to domain admin. https://t.co/KQxSxZIlsE https://github.com/ly4k/Pachine | ly4k_ |
2021-12-13 23:51:47 | Sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/ktXxB8oKSg #Python https://github.com/WazeHell/sam-the-admin | JekiCode |
2021-12-13 23:51:15 | https://t.co/1uYbItKuWj Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter #cybersecurity https://github.com/ricardojba/Invoke-noPac | netsecu |
2021-12-13 21:52:57 | New post: "Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter" https://t.co/HRPRomFalt https://ift.tt/3ERTHXn | Myinfosecfeed |
2021-12-13 21:26:08 | Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/njwVfKIshz https://github.com/ricardojba/Invoke-noPac | _r_netsec |
2021-12-13 21:22:54 | Careful with sAMAccountName (CVE-2021-42278 and CVE-2021-42287) automatic exploits scripts They mostly automate so… https://t.co/3l0hNyjpPz https://twitter.com/i/web/status/1470499760419360773 | _nwodtuhs |
2021-12-13 21:02:41 | Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter via /r/netsec https://t.co/QzL9LQjbuZ #cybersecurity #netsec #news https://ift.tt/3ypBdeM | CybrXx0 |
2021-12-13 20:43:34 | @Laughing_Mantis Installing the patch for CVE-2021-42278 is enough to be protected, or do you also need the patch (… https://t.co/a92Br0kwJ2 https://twitter.com/i/web/status/1470489365436633101 | flowid3 |
2021-12-13 20:26:29 | @Jean_Maes_1994 @netbiosX @ShitSecure ah right the context is CVE-2021-42287/CVE-2021-42278 | BenTyson16 |
2021-12-13 20:08:27 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate #DomainAdmin from standard #DomainUser -… https://t.co/AGi2RfkL8k https://twitter.com/i/web/status/1470482773471375370 | bemre |
2021-12-13 19:47:57 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/lguqR1EfaL https://github.com/Ridter/noPac | netbiosX |
2021-12-13 18:55:42 | ■■■■□ noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/IEhOoXXg8a https://twitter.com/i/web/status/1470458892597538817 | cKure7 |
2021-12-13 17:14:08 | While everyone is focused on #log4j Defenders really need to patch their domain controllers against CVE-2021-42278… https://t.co/q8e8JHc79x https://twitter.com/i/web/status/1470440340226252805 | rootsecdev |
2021-12-13 16:43:04 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/fPndDqnPvn https://t.co/NtkTklnYSC https://ift.tt/3pQU9Pu https://ift.tt/3pVI6Ao | buaqbot |
2021-12-13 15:25:33 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-12-13 13:11:47 | Hackers weaponize CVE-2021-42287, CVE-2021-42278 to reach #ActiveDirectory domain admin rights from a standard user… https://t.co/0KeacU3zRE https://twitter.com/i/web/status/1470379966403645449 | SOC_Prime |
2021-12-13 10:55:27 | Taking over AD by adding a computer and messing around with samAccountName (CVE-2021-42278)? You can find out who c… https://t.co/sPmwIi7k5G https://twitter.com/i/web/status/1470343778775056390 | lkarlslund |
2021-12-13 00:32:13 | Con todo el show de #Log4shell se nos está pasando por alto el CVE-2021-42278 que permite escalar una cuenta a Doma… https://t.co/NdBlgtzVHf https://twitter.com/i/web/status/1470188707995168768 | ProtAAPP |
2021-12-12 20:56:50 | PSA: #log4j & windows domain exploitation via CVE-2021-42278 If you are a windows domain shop it is VERY IMPORTAN… https://t.co/5kNJWye2Ke https://twitter.com/i/web/status/1470132752234135557 | Laughing_Mantis |
2021-12-12 20:03:22 | @nas_bench what about this CVE-2021-42287/CVE-2021-42278 , people are igoning it. Easy AD admin | RaoufAbderrahm1 |
2021-12-12 19:59:37 | detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278 https://t.co/xrpcK3qA2W… https://t.co/mqaOcRNMUz https://github.com/elastic/detection-rules/blob/a5359ca675267220afedf67795cd1fd04881b2c8/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml https://twitter.com/i/web/status/1470117387626291202 | SBousseaden |
2021-12-12 18:14:11 | CVE-2021-42287/CVE-2021-42278 Weaponisation #log4j #Log4Shell https://t.co/jg3k7kyVna https://twitter.com/safe_buffer/status/1469742616505954323 | 0xba3ba4 |
2021-12-12 17:41:27 | You should really give CVE-2021-42278 a closer look. Easy Domain-Admin for everyone. https://t.co/vQ2aCIZ5WI… https://t.co/rz4XgJJDYA https://www.thehacker.recipes/ad/movement/kerberos/samaccountname-spoofing https://twitter.com/i/web/status/1470084831409504256 | NandanLohitaksh |
2021-12-12 17:22:09 | GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/rJhTCQAeUk https://twitter.com/i/web/status/1470077137155772423 | akaclandestine |
2021-12-12 17:21:49 | Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/yuDNiMIXwf https://twitter.com/i/web/status/1470078325632606213 | beingsheerazali |
2021-12-12 15:41:50 | Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows #redteam Git… https://t.co/toh6ziFnDu https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470055072403005448 | hack_git |
2021-12-12 15:34:37 | eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Securityblog |
2021-12-12 15:34:25 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/AZ9PyHK14s https://github.com/cube0x0/noPac | Securityblog |
2021-12-12 15:20:16 | NoPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/5LRYM29Nqe #C# https://github.com/cube0x0/noPac | JekiCode |
2021-12-12 15:13:10 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-12-12 12:22:35 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Ue8MKqnIQq from @exploitph https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Z0vsky |
2021-12-12 12:10:54 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. - https://t.co/SYNbWatb5n https://github.com/cube0x0/noPac | moton |
2021-12-12 09:12:56 | You should really give CVE-2021-42278 a closer look. Easy Domain-Admin for everyone. https://t.co/foZPsElp53… https://t.co/apcjunICth https://www.thehacker.recipes/ad/movement/kerberos/samaccountname-spoofing https://twitter.com/i/web/status/1469956810543091720 | theluemmel |
2021-12-12 09:11:43 | @2Obeto @zippy1981 @Microsoft Improper code is MS’s fault (CVE-2021-42287, CVE-2021-42278) Improper guidance is MS’… https://t.co/9jFnfmMv4X https://twitter.com/i/web/status/1469957286055534593 | _nwodtuhs |
2021-12-12 08:41:30 | noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/8eIT0QTzeR https://twitter.com/i/web/status/1469949174812655617 | hack_git |
2021-12-12 07:00:36 | #tools #Offensive_security 1. JNDI Exploit Kit https://t.co/9BMNP1RREo 2. CVE-2021-42287/CVE-2021-42278 Scanner & E… https://t.co/HqYlVmYHdO https://github.com/pimps/JNDI-Exploit-Kit https://twitter.com/i/web/status/1469924171337641985 | ksg93rd |
2021-12-12 04:52:49 | log4j の件で話題が持ちきりですが、 AD 管理をしている場合は、こちらも目を通しておく必要があるかなと。 CVE-2021-42287/CVE-2021-42278 Weaponisation:… https://t.co/YZVETMwfxo https://twitter.com/i/web/status/1469889848832327680 | mimura1133 |
2021-12-12 04:01:20 | Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/NrzCO8aNBg https://twitter.com/i/web/status/1469875434670100480 | NandanLohitaksh |
2021-12-12 02:00:32 | “CVE-2021-42287/CVE-2021-42278 Weaponisation” https://t.co/1qrYjvOp4Z https://htn.to/4nkd8PSNXG | waiha8 |
2021-12-11 21:11:46 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate Domain Admin from standard domain user https://t.co/T3MFmpMbHe https://github.com/WazeHell/sam-the-admin | ixmailsaygili |
2021-12-11 20:51:55 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/wuhXIe9Cew https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | RapidSafeguard |
2021-12-11 20:13:04 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/Ee3chyeFFd https://github.com/cube0x0/noPac | akaclandestine |
2021-12-11 20:00:52 | Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/QfHoaoVmLw https://twitter.com/i/web/status/1469753978166685697 | cube0x0 |
2021-12-11 19:02:57 | Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/u5hStleCNn https://twitter.com/i/web/status/1469742616505954323 | safe_buffer |
2021-12-11 16:34:04 | CVE-2021-42278 Microsoft Active Directory Domain Services Elevation of P... https://t.co/ywCEaPG9ef Don't wait v… https://t.co/s6H1LWGyzX http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-42278 https://twitter.com/i/web/status/1469703561013514244 | VulmonFeeds |
2021-12-10 22:12:04 | ** CVE-2021-42278 - Name impersonation Before patch, there was no validation process to make sure computer accounts names end with an "$" | _nwodtuhs |
2021-12-10 22:11:42 | @BlackSnufkin42 Namaste, here is your unroll: So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278…… https://t.co/6Ct1CfJhCE https://twitter.com/i/web/status/1469426786165473280 | threadreaderapp |
2021-12-10 14:52:48 | So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278 Weaponization - a quick & dirty way to exploit… https://t.co/0IKxwXf2l9 https://twitter.com/i/web/status/1469316932180619268 | snovvcrash |
2021-12-10 11:33:47 | Please make sure you have installed patches for CVE-2021-42287 / CVE-2021-42278. Exploitation itself is trivial and… https://t.co/VHNK8I0iLi https://twitter.com/i/web/status/1469268110683344905 | FuzzySec |
2021-12-10 04:10:05 | So with some help from @_EthicalChaos_ I found a way to weaponise CVE-2021-42287/CVE-2021-42278 and more help from… https://t.co/eWfQDzEVzB https://twitter.com/i/web/status/1469157138928914432 | exploitph |
2021-11-12 22:03:22 | New post from https://t.co/9KYxtdZjkl (CVE-2021-42278 (windows_server_2008, windows_server_2012, windows_server_201… https://t.co/VffmOCy2N3 http://www.sesin.at https://twitter.com/i/web/status/1459277475062726656 | www_sesin_at |
2021-11-12 22:02:21 | New post from https://t.co/uXvPWJy6tj (CVE-2021-42278 (windows_server_2008, windows_server_2012, windows_server_201… https://t.co/kCHQ58z48s http://www.sesin.at https://twitter.com/i/web/status/1459277508470362120 | WolfgangSesin |
2021-11-12 19:20:17 | 🚨 NEW: CVE-2021-42278 🚨 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique… https://t.co/ZWBTuK6M5z https://twitter.com/i/web/status/1459239457861902337 | threatintelctr |
2021-11-10 23:11:35 | CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.html | Har_sia |
2021-11-10 08:04:40 | New post from https://t.co/uXvPWJy6tj (CVE-2021-42278) has been published on https://t.co/CREbIhhsn1 http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42278/ | WolfgangSesin |
2021-11-10 08:04:14 | New post from https://t.co/9KYxtdZjkl (CVE-2021-42278) has been published on https://t.co/JYgjNSbfVx http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42278/ | www_sesin_at |
2021-11-10 08:01:29 | One night, CVE-2021-42278 wished upon a star, and today that wish has been granted. It now has a name, like a real,… https://t.co/VZ3B82bHtE https://twitter.com/i/web/status/1458342756951146497 | vulnonym |
2021-11-10 01:51:38 | CVE-2021-42278 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE… https://t.co/AAdmV1ME2e https://twitter.com/i/web/status/1458249421297172484 | CVEnew |
2021-11-10 01:15:07 | CVE-2021-42278 : Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from C… https://t.co/le70bK6UrT https://twitter.com/i/web/status/1458239501583720453 | CVEreport |
2021-11-10 00:52:03 | IT Risk: Windows 7,Windows Server 2008,Windows Server 2008 R2に複数の脆弱性 -2/3 CVE-2021-42282 CVE-2021-42278 CVE-2021-42… https://t.co/qENvqHsykA https://twitter.com/i/web/status/1458233081828036611 | management_sun |
2021-11-09 22:14:20 | CVE-2021-42278 Microsoft Active Directory Domain Services Elevation of Privilege Vulnerability. Exploitation Less… https://t.co/AducEmQrES https://twitter.com/i/web/status/1458193317317988360 | VulmonFeeds |