{"uuid": "fb7833b5-8edd-4f79-aa19-785c45950925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-21894", "type": "seen", "source": "https://t.me/crackcodes/1040", "content": "Updates On Hackbyte Forum:-\n\n1. Universidad IEU Mexico Leak Files\n2. SCS-Siberia \u201c\u0421\u041a\u0421-\u0421\u0438\u0431\u0438\u0440\u044c\u201d \u2013 Telecommunications Company Russia Leak\n3. D.RDynamicShellcode\n4. DashOverride\n5. CVE-2022-33980 - Apache Commons RCE can use url,dns,script key-words to connect any server\n6. lfimap - Local file inclusion discovery and exploitation tool\n7. MSMAP - Msmap is a Memory WebShell Generator\n8. CVE-2022-29968\n9. CVE-2022-21894 - Secure Boot Security Feature Bypass Vulnerability\n10. PowerHuntShares\n11. chrome_password Js script - Steal Get username &amp; password from Chrome. (Now Only Windows)\n12. Fatebot - Fate is IRC botnet\n13. JNDI-Injection-Exploit-Plus\n14. CVE-2022-27255 - Realtek eCos SDK SIP ALG buffer overflow\n15. Bypass-Sandbox-Evasion\n16. blackhat-arsenal-tools\n17. Blackhat 2022 recap \u2013 cloud, eBPF, global conflicts, supply chain, and more\n18. Hacking Zyxel IP cameras to gain a root shell\n19. CobaltStrike4.5\n20. DUOCELL Leak\n21. KisasaCredit Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-18T15:53:26.000000Z"}