{"uuid": "9f44c765-819d-416e-8b7d-7ffbc5f2b2ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22906", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3120", "content": "CVE-2023-22906\n\nA critical vulnerability that affects the Hero Qubo Smart Doorbell device running version HCD01_02_V1.38_20220125. This particular device allows Telnet access with root privileges by default, without requiring a password. \n\nhttps://github.com/nonamecoder/CVE-2023-22906\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bShellGhost\n\nA memory-based evasion technique which makes shellcode invisible from process start to end.\n\nhttps://github.com/lem0nSec/ShellGhost\n\n#infosec #pentesting #redteam\n\n\u200b\u200bOSCE3-Complete-Guide\n\nOSWE, OSEP, OSED, and OSEE Study Guide.\n\nhttps://github.com/CyberSecurityUP/OSCE3-Complete-Guide\n\n#infosec #pentesting #redteam\n\n\u200b\u200bRedCloud-OS\n\nA Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs).\n\nhttps://github.com/RedTeamOperations/RedCloud-OS\n\n#infosec #pentesting #redteam\n\n\u200b\u200b\ud83e\udd16 superman\n\nKill The Protected Process\n\nhttps://github.com/b1-team/superman\n\n#cybersecurity #infosec\n\n\u200b\u200bSatIntel\n\nSatIntel is an #OSINT tool for Satellites \ud83d\udef0. Extract satellite telemetry, receive orbital predictions, and parse T7LEs \ud83d\udd2d\n\nhttps://github.com/ANG13T/SatIntel\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\n\n2/2", "creation_timestamp": "2023-07-15T21:15:43.000000Z"}