{"uuid": "df8a0eab-274d-4520-ba63-6e5483efa725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21225", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7341", "content": "#Offensive_security\n1. A collection of various and sundry code snippets that leverage .NET dynamic tradecraft\nhttps://github.com/bohops/DynamicDotNet\n2. Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation\nhttps://github.com/HackCommander/PHP-info-cookie-stealer\n3. From SQL Injection to RCE on Intel DCM (CVE-2022-21225)\nhttps://www.rcesecurity.com/2022/12/from-zero-to-hero-part-2-intel-dcm-sql-injection-to-rce-cve-2022-21225", "creation_timestamp": "2022-12-12T11:00:33.000000Z"}