{"uuid": "66781ac2-1aa7-4410-b11e-a8af638f56e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24165", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}