{"uuid": "db848cc5-2654-4f2f-b461-4ce34c1ffb7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24342", "type": "seen", "source": "https://t.me/crackcodes/796", "content": "Today's Update\n1. nday exploit: netgear orbi unauthenticated command injection (CVE-2020-27861)\n2. Collection of Exploits, CVES(Unauthenticated) and Wordpress Scanners\n3. CVE-2022-24706 exploit\n4. Androguard Tool - Reverse engineering and pentesting of Android applications.\n5. Amsi-Bypass-Powershell Scripts\n6. Bug-Bounty-Tips\n7. nacs - Event-driven pentest scanner\n8. Malaysia locatefamily Data leak\n9. Jaeles \u2013 The Swiss Army knife for automated Web Application Testing\n10. D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife \u2013 Lateral movement using DCOM Objects\n11. Pak Military Garments Company Data dump Video\n12. CVE-2022-24342 - JetBrains TeamCity \u2013 account takeover via CSRF in GitHub authentication (PoC)\n\nLink:- https://forum.hackbyte.org", "creation_timestamp": "2022-07-05T14:02:24.000000Z"}