GDB HackerOne
512 subscribers
40 photos
81 videos
153 files
138 links
Google Database (GDB) is a categorized index of Internet search engine queries designed information publicly available
Download Telegram
Media is too big
VIEW IN TELEGRAM
12.3 Chaining Open Redirection with SSRF to Bypass More Restrictive Filters.mp4
13.BLIND SSRF VULNERABILITIES
Media is too big
VIEW IN TELEGRAM
13.1 Intro to Blind SSRF Vulnerabilities.mp4
Media is too big
VIEW IN TELEGRAM
13.2 Discovering Blind SSRF Vulnerabilities.mp4
Media is too big
VIEW IN TELEGRAM
13.3 Exploiting Blind SSRF Vulnerabilities.mp4
Media is too big
VIEW IN TELEGRAM
13.4 Escalating Blind SSRF to a Remote Code Execution (RCE).mp4
14. HACKING ON THE CLOUD!
Media is too big
VIEW IN TELEGRAM
14.2 Installing Kali on The Cloud.mp4
Media is too big
VIEW IN TELEGRAM
14.3 Communicating With Cloud Servers Securely Using SSH.mp4
Media is too big
VIEW IN TELEGRAM
14.4 Configuring Firewall Rules & Hosting Files.mp4
Media is too big
VIEW IN TELEGRAM
14.5 Receiving Backdoor Connections Over the Cloud.mp4
Media is too big
VIEW IN TELEGRAM
14.6 Installing BeEF & Hooking Targets Over the Cloud.mp4
Exam passing services available
100% trusted and verified
Dm @Pass_exam
elearn certs
CEH ansi and practical
OSCP
OSEP
OSWE
OSWP
CRTP
CRTE
CRTO
Dms got deleted by mistake
People who messaged @Pass_exam dm again
Forwarded from cybermetics
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM


This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2022-20083
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-21744
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-33936
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-32449
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-31137
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

ID: CVE-2022-25046
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)