{"uuid": "338fe254-873e-4708-85db-8b11d5d7115d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-6389", "type": "published-proof-of-concept", "source": "https://t.me/D4RKW0R1D/557", "content": "FROM INTERNET\n\n1)CVE-2018-6389 exploitation - using scripts loader\nhttps://hackerone.com/reports/925425\n\n2)No DMARC record at cordacon.com\nhttps://hackerone.com/reports/1125143\n\n3)Fortinet FortiWeb OS Command Injection\nhttps://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection/\n\n4)How I found read/write access to the personal data of 3 million users of an E-commerce website?\nhttps://medium.com/@psr595bro/how-i-found-read-write-access-to-the-personal-data-of-3-million-users-of-an-e-commerce-website-b9026b0d4bd3\n\n5)Secure Coding Handbook\nhttps://vladtoie.gitbook.io/secure-coding/\n\n6)Top 10 Kubernetes Application Security Hardening Techniques\nhttps://blog.aquasec.com/kubernetes-hardening-techniques?utm_campaign=General%20website&amp;utm_medium=email&amp;_hsmi=150580512&amp;_hsenc=p2ANqtz-97I89xNVbSDmrI-6_skudpuKla-2JD0OyfIGrOQjOzHaPHKFNH-yb-vsMmjcOxUtBSOj__vlDRyYYlEdqvzg1Ujdc01w&amp;utm_content=150580512&amp;utm_source=hs_email\n\n7)Vulnerability Assessment I A Complete Guide\nhttps://www.hackerone.com/blog/vulnerability-assessment-i-complete-guide\n\n8)Breaking into Cybersecurity Successfully.pdf\nhttps://github.com/iamthefrogy/FYI/blob/main/Material/Breaking%20into%20Cybersecurity%20Successfully.pdf", "creation_timestamp": "2021-08-19T08:21:59.000000Z"}