{"uuid": "71431c22-8ea8-4169-a8af-961c7b222726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45519", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3783", "content": "Hackers Factory \n\nShodan Mindmap - For Hacking! \n\nSource: https://github.com/Ignitetechnologies/Mindmap/blob/main/Shodan/Shodan%20HD.png\n\nGuide: Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4\n\nBlog: https://artificesecurity.com/how-to-build-your-own-penetration-testing-dropbox-using-a-raspberry-pi-4/\n\n#infosec #bugbountytips\n\nDetailed Checklist: Android APK Pentesting Checklist \n\nChecklist: https://book.hacktricks.xyz/mobile-pentesting/android-checklist\n\n#infosec\n\nCVE-2024-45519:  Checks vulnerabilities in an SMTP server, Zimbra Remote Command Execution.\n\nhttps://github.com/p33d/CVE-2024-45519\n\nFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon.\n \nhttps://github.com/lutfumertceylan/top25-parameter\n\nXXE payloads for specific DTDs\n\nhttps://github.com/GoSecure/dtd-finder/blob/698fd678f26395e1c7c097525f7182aecad0cd5f/list/xxe_payloads.md\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-08T09:21:15.000000Z"}