Forwarded from cybermetics
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM
This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.
ID:CVE-2022-20083
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-21744
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-33936
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-32449
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-31137
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:CVE-2022-25046
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM
This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.
ID:
Title: Out-of-bounds write in Modem 2G/3G CC
Description: In Modem 2G/3G CC, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Out-of-bounds write in Modem 2G RR
Description: In Modem 2G RR, there is a possible out-of-bounds write due to missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighboring cell size with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Remote code execution vulnerability in Dell EMC Storage
Description: Cloud Mobility for Dell EMC Storage, 1.3.0.XXX contains an RCE vulnerability. A non-privileged user could potentially exploit this vulnerability, leading to achieving a root shell. This is a critical issue; so, Dell recommends customers upgrade at the earliest opportunity.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484
Description: TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Remote code execution vulnerability in Roxy-WI
Description: Roxy-WI is a web interface for managing Haproxy, Nginx, Apache, and Keepalived servers.
Roxy-WI versions older than 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
ID:
Title: Path traversal vulnerability in CWP v0.9.8.1122
Description: A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.
CVSS v3.1 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
mail.acronis.com is vulnerable to zero day vulnerability CVE-2022-41040
https://hackerone.com/reports/1719719
https://hackerone.com/reports/1719719
HackerOne
Acronis disclosed on HackerOne: mail.acronis.com is vulnerable to...
mail.acronis.com was vulnerable to CVE-2022-41040.
After internal investigation, Acronis security team concluded that there are no signs of exploitation of this issue.
After internal investigation, Acronis security team concluded that there are no signs of exploitation of this issue.
THM RT.zip
100.9 MB
#Leaked โก๏ธ
Learn the skills needed to become a Red Team Operator
Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Level: Intermediate | 48 hours
@redteamcollection
Red Teaming tryhackme ๐งโ๐ปLearn the skills needed to become a Red Team Operator
Use diverse techniques for initial access
Enumerate and persist on targets`
Evade security solutions
Exploit Active Directory
Level: Intermediate | 48 hours
@redteamcollection
โโโโ1 Red Team Fundamentals
โ โโโโTryHackMe _ Intro to C2_files
โ โโโโTryHackMe _ Red Team Engagements_files
โ โโโโTryHackMe _ Red Team Fundamentals_files
โ โโโโTryHackMe _ Red Team OPSEC_files
โ โโโโTryHackMe _ Red Team Threat Intel_files
โโโโ2 Initial Access
โ โโโโTryHackMe _ Password Attacks_files
โ โโโโTryHackMe _ Phishing_files
โ โโโโTryHackMe _ Red Team Recon_files
โ โโโโTryHackMe _ Weaponization_files
โโโโ3 Post Compromise
โ โโโโTryHackMe _ Data Exfiltration_files
โ โโโโTryHackMe _ Enumeration_files
โ โโโโTryHackMe _ Lateral Movement and Pivoting_files
โ โโโโTryHackMe _ The Lay of the land_files
โ โโโโTryHackMe _ Windows Local Persistence_files
โ โโโโTryHackMe _ Windows Privilege Escalation_files
โโโโ4 Host Evasions
โ โโโโTryHackMe _ Abusing Windows Internals_files
โ โโโโTryHackMe _ AV Evasion_ Shellcode_files
โ โโโโTryHackMe _ Bypassing UAC_files
โ โโโโTryHackMe _ Evading Logging and Monitoring_files
โ โโโโTryHackMe _ Introduction to Antivirus_files
โ โโโโTryHackMe _ Introduction to Windows API_files
โ โโโโTryHackMe _ Living Off the Land_files
โ โโโโTryHackMe _ Obfuscation Principles_files
โ โโโโTryHackMe _ Runtime Detection Evasion_files
โ โโโโTryHackMe _ Signature Evasion_files
โ โโโโTryHackMe _ Windows Internals_files
โโโโ5 Network Scurity Evasion
โ โโโโTryHackMe _ Firewalls_files
โ โโโโTryHackMe _ Network Security Solutions_files
โ โโโโTryHackMe _ Sandbox Evasion_files
โโโโ6 Compromising AD
โโโโTryHackMe _ Active Directory Basics_files
โโโโTryHackMe _ Breaching Active Directory_files
โโโโTryHackMe _ Credentials Harvesting_files
โโโโTryHackMe _ Enumerating Active Directory_files
โโโโTryHackMe _ Exploiting Active Directory_files
โโโโTryHackMe _ Lateral Movement and Pivoting_files
โโโโTryHackMe _ Persisting Active Directory_files
โ โโโโTryHackMe _ Intro to C2_files
โ โโโโTryHackMe _ Red Team Engagements_files
โ โโโโTryHackMe _ Red Team Fundamentals_files
โ โโโโTryHackMe _ Red Team OPSEC_files
โ โโโโTryHackMe _ Red Team Threat Intel_files
โโโโ2 Initial Access
โ โโโโTryHackMe _ Password Attacks_files
โ โโโโTryHackMe _ Phishing_files
โ โโโโTryHackMe _ Red Team Recon_files
โ โโโโTryHackMe _ Weaponization_files
โโโโ3 Post Compromise
โ โโโโTryHackMe _ Data Exfiltration_files
โ โโโโTryHackMe _ Enumeration_files
โ โโโโTryHackMe _ Lateral Movement and Pivoting_files
โ โโโโTryHackMe _ The Lay of the land_files
โ โโโโTryHackMe _ Windows Local Persistence_files
โ โโโโTryHackMe _ Windows Privilege Escalation_files
โโโโ4 Host Evasions
โ โโโโTryHackMe _ Abusing Windows Internals_files
โ โโโโTryHackMe _ AV Evasion_ Shellcode_files
โ โโโโTryHackMe _ Bypassing UAC_files
โ โโโโTryHackMe _ Evading Logging and Monitoring_files
โ โโโโTryHackMe _ Introduction to Antivirus_files
โ โโโโTryHackMe _ Introduction to Windows API_files
โ โโโโTryHackMe _ Living Off the Land_files
โ โโโโTryHackMe _ Obfuscation Principles_files
โ โโโโTryHackMe _ Runtime Detection Evasion_files
โ โโโโTryHackMe _ Signature Evasion_files
โ โโโโTryHackMe _ Windows Internals_files
โโโโ5 Network Scurity Evasion
โ โโโโTryHackMe _ Firewalls_files
โ โโโโTryHackMe _ Network Security Solutions_files
โ โโโโTryHackMe _ Sandbox Evasion_files
โโโโ6 Compromising AD
โโโโTryHackMe _ Active Directory Basics_files
โโโโTryHackMe _ Breaching Active Directory_files
โโโโTryHackMe _ Credentials Harvesting_files
โโโโTryHackMe _ Enumerating Active Directory_files
โโโโTryHackMe _ Exploiting Active Directory_files
โโโโTryHackMe _ Lateral Movement and Pivoting_files
โโโโTryHackMe _ Persisting Active Directory_files
XRY Reader to XAMN Viewer transition course
Module 1:
https://bit.ly/2tgjipU
Module 2:
https://bit.ly/2DBrHJc
Module 3:
https://bit.ly/2RSAmfH
Module 4:
https://bit.ly/2N0uZu0
password for the course is โ
Module 1:
https://bit.ly/2tgjipU
Module 2:
https://bit.ly/2DBrHJc
Module 3:
https://bit.ly/2RSAmfH
Module 4:
https://bit.ly/2N0uZu0
password for the course is โ
xamnviewerโCELLEBRITE AND MSAB
Cellebrite magnet link:
Cellebrite magnet link:
magnet:?xt=urn:btih:f881291ab69fff48393ede2e36a4f8fcb4b5bf7a&dn=cellebrite&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce
MSAB download link:magnet:?xt=urn:btih:0e7d11a34f71887aca3a388795e0b019cca44858&dn=msab.tar.zst&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A6969%2Fannounce&tr=https%3A%2F%2Fopentracker.i2p.rocks%3A443%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounceโจ
๐งต๐ง๐ง๐ง๐ง๐ง
๐งตโฌ๏ธโฌ๏ธ๐ตโฌโฌ
๐งต๐ฉ๐ฉ๐ฉ๐ฉ๐ฉ
๐งต ๐ฟ
๐งต ๐บ
๐งต ๐ฑ ๐ธ
๐งต ๐
๐งต ๐ ๐
๐งต
๐งต ๐ ๐บ
๐งต
๐งต๐ ๐ ๐
๐งต ๐บ
๐งต ๐ธ
๐๐๐
๐๐๐๐
๐๐๐๐๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
HAPPY REPUBLIC DAY ๐ ๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
๐ฅ๐ ๐๐ฎ ๐๐๐ฃ๐ ๐ ๐๐ฎ ๐ฝ๐๐๐ง๐๐ฉ๐ฅ
๐ฎ๐ณ๐๐๐๐๐ 74๐ญ๐ก ๐๐๐๐๐๐๐๐ ๐๐๐
๐งต๐ง๐ง๐ง๐ง๐ง
๐งตโฌ๏ธโฌ๏ธ๐ตโฌโฌ
๐งต๐ฉ๐ฉ๐ฉ๐ฉ๐ฉ
๐งต ๐ฟ
๐งต ๐บ
๐งต ๐ฑ ๐ธ
๐งต ๐
๐งต ๐ ๐
๐งต
๐งต ๐ ๐บ
๐งต
๐งต๐ ๐ ๐
๐งต ๐บ
๐งต ๐ธ
๐๐๐
๐๐๐๐
๐๐๐๐๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
HAPPY REPUBLIC DAY ๐ ๐
โโโโโโโโโโโโโโโโโโโโโโ
๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณโโโ๐ค โ๐ฎ๐ณ
โโโโโโโโโโโโโโโโโโโโโโ
๐ฅ๐ ๐๐ฎ ๐๐๐ฃ๐ ๐ ๐๐ฎ ๐ฝ๐๐๐ง๐๐ฉ๐ฅ
๐ฎ๐ณ๐๐๐๐๐ 74๐ญ๐ก ๐๐๐๐๐๐๐๐ ๐๐๐
QRLJackerQRLJacker is a highly customizable exploitation framework to hijack services that depend on QR Code as an authentication and login method
OWASP's links reference
https://www.owasp.org/index.php/QRLJacking
https://www.owasp.org/index.php/OWASP_QRLJacker
If you want to write your own module
Read here
โ๏ธ Github repositories every Developer should know โ๏ธ
โ๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.
https://github.com/sindresorhus/awesome
โ๏ธClean Code JavaScript
https://github.com/ryanmcdermott/clean-code-javascript
โ๏ธTech Interview Handbook
https://github.com/yangshun/tech-interview-handbook
โ๏ธDeveloper Roadmaps, articles and resources for developers.
https://github.com/kamranahmedse/developer-roadmap
โ๏ธ33 JS Concepts
https://github.com/leonardomso/33-js-concepts
โ๏ธBest websites a programmer should visit
https://github.com/sdmg15/Best-websites-a-programmer-should-visit
โ๏ธDesign Resources for Developers
https://github.com/bradtraversy/design-resources-for-developers
โ๏ธBig List of Naughty Strings:
https://github.com/minimaxir/big-list-of-naughty-strings
โ๏ธA very popular repo that curates all topics from Development, testing, business, etc, etc.
https://github.com/sindresorhus/awesome
โ๏ธClean Code JavaScript
https://github.com/ryanmcdermott/clean-code-javascript
โ๏ธTech Interview Handbook
https://github.com/yangshun/tech-interview-handbook
โ๏ธDeveloper Roadmaps, articles and resources for developers.
https://github.com/kamranahmedse/developer-roadmap
โ๏ธ33 JS Concepts
https://github.com/leonardomso/33-js-concepts
โ๏ธBest websites a programmer should visit
https://github.com/sdmg15/Best-websites-a-programmer-should-visit
โ๏ธDesign Resources for Developers
https://github.com/bradtraversy/design-resources-for-developers
โ๏ธBig List of Naughty Strings:
https://github.com/minimaxir/big-list-of-naughty-strings
GitHub
GitHub - sindresorhus/awesome: ๐ Awesome lists about all kinds of interesting topics
๐ Awesome lists about all kinds of interesting topics - sindresorhus/awesome