{"uuid": "f840342f-68e0-475a-b4f7-ab4d215e97b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42889", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7110", "content": "#tools\n#Blue_Team_Techniques\n1. A python script developed to process Windows memory images based on triage type\nhttps://github.com/CrowdStrike/SuperMem\n2. Script to handle CVE 2022-42889: removing the older version of Apache Commons Text 1.9 and replaces it with the newer version (1.10.0) in\u00a0JMETER_HOME/lib\u00a0folder\nhttps://github.com/QAInsights/cve-2022-42889-jmeter\n3. Powershell Exploit detection for Windows\nhttps://github.com/jake-k-38/win-ioc-detect", "creation_timestamp": "2022-11-06T13:27:02.000000Z"}