Create a company technological profile in one click π₯
In a new article on our Medium we will tell you how to complete your company research using Netlas.io.
This time we will find the services used, information about providers and much more π
ππ» Read now: https://blog.netlas.io/building-tech-profile-of-a-company-f2145dedad31
In a new article on our Medium we will tell you how to complete your company research using Netlas.io.
This time we will find the services used, information about providers and much more π
ππ» Read now: https://blog.netlas.io/building-tech-profile-of-a-company-f2145dedad31
Medium
Netlas.io β Medium
Read writing from Netlas.io on Medium. Discover, research and monitor any assets available online. Every day, Netlas.io and thousands of other voices read, write, and share important stories on Medium.
π₯5πΎ3π1
CVE-2024-24919: Exposure of Sensitive Information in Check Point π₯
A vulnerability that has been on everyone's lips in recent days. Allows an unauthenticated attacker to gain access to sensitive information.
Search at Netlas.io:
π Link (tag, more results): https://nt.ls/z9fQV
π Dork (tag, more results): tag.name:"checkpoint"
π Link (no tag): https://nt.ls/tnMCW
π Dork (no tag): http.favicon.hash_sha256:9a3a865d8911afcd95389ec701e5e8abcad69d928efd5b52b5d0bcc70a60d11a
Vendor's advisory: https://support.checkpoint.com/results/sk/sk182336
A vulnerability that has been on everyone's lips in recent days. Allows an unauthenticated attacker to gain access to sensitive information.
Search at Netlas.io:
π Link (tag, more results): https://nt.ls/z9fQV
π Dork (tag, more results): tag.name:"checkpoint"
π Link (no tag): https://nt.ls/tnMCW
π Dork (no tag): http.favicon.hash_sha256:9a3a865d8911afcd95389ec701e5e8abcad69d928efd5b52b5d0bcc70a60d11a
Vendor's advisory: https://support.checkpoint.com/results/sk/sk182336
πΎ6π₯3π2
Netlas.io and RST Cloud collaboration π€
We trust you've observed the inclusion of threat intelligence data in the Netlas search with the release of version 0.24.0. This advancement was made achievable through our partnership with RST Cloud.
Today, we are pleased to unveil an official press release for those inclined to acquaint themselves with the full array of collaborative features.
ππ» Press release: https://www.linkedin.com/posts/netlas-io_netlas-and-rst-cloud-forge-alliance-to-enhance-activity-7204777141576581120-E1H3/
We trust you've observed the inclusion of threat intelligence data in the Netlas search with the release of version 0.24.0. This advancement was made achievable through our partnership with RST Cloud.
Today, we are pleased to unveil an official press release for those inclined to acquaint themselves with the full array of collaborative features.
ππ» Press release: https://www.linkedin.com/posts/netlas-io_netlas-and-rst-cloud-forge-alliance-to-enhance-activity-7204777141576581120-E1H3/
Linkedin
Netlas.io on LinkedIn: Netlas and RST Cloud Forge Alliance to Enhance Cyber Threat Intelligenceβ¦
Netlas and RST Cloud Forge Alliance to Enhance Cyber Threat Intelligence and Threat Hunting Capabilities
Netlas.io, a leading platform for internet-wideβ¦
Netlas.io, a leading platform for internet-wideβ¦
πΎ5π3π₯3β€1
CVE-2024-34102 and others: Multiple vulns in Magento Open Source, 4.8 - 9.8 rating π₯π₯π₯
New vulnerabilities in Magento (and Adobe Commerce) for every taste: arbitrary code execution, security feature bypass and privilege escalation!
Search at Netlas.io:
π Link: https://nt.ls/rxUR7
π Dork: tag.name:"magento"
Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb24-40.html
New vulnerabilities in Magento (and Adobe Commerce) for every taste: arbitrary code execution, security feature bypass and privilege escalation!
Search at Netlas.io:
π Link: https://nt.ls/rxUR7
π Dork: tag.name:"magento"
Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb24-40.html
π₯5πΎ4π3
CVE-2024-37079, -37080, -37081: Multiple vulns in VMware vSphere and vCenter, 7.8 - 9.8 rating π₯π₯π₯
RCE via heap overflow and local privilege escalation in several VMware products.
Search at Netlas.io:
π Link: https://nt.ls/hgQQd
π Dork: http.title:"ID_VC_Welcome" OR certificate.issuer.domain_component:"vsphere"
Vendor's advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
RCE via heap overflow and local privilege escalation in several VMware products.
Search at Netlas.io:
π Link: https://nt.ls/hgQQd
π Dork: http.title:"ID_VC_Welcome" OR certificate.issuer.domain_component:"vsphere"
Vendor's advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
πΎ5π₯4π2
CVE-2024-28995: Path Traversal in SolarWind Serv-U, 8.6 rating π₯
Vulnerability disclosed with a fresh hotfix. Successful exploitation allows the attacker to bypass security checks and get sensitive files. PoC is now available on GitHub!
Search at Netlas.io:
ππ» Link: https://nt.ls/9vwgf
ππ» Dork: http.headers.server:"Serv U"
Vendor's advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995
Vulnerability disclosed with a fresh hotfix. Successful exploitation allows the attacker to bypass security checks and get sensitive files. PoC is now available on GitHub!
Search at Netlas.io:
ππ» Link: https://nt.ls/9vwgf
ππ» Dork: http.headers.server:"Serv U"
Vendor's advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995
π₯5πΎ4β€2
CVE-2024-5655 and others: Multiple vulns in GitLab, 7.5 - 9.6 rating π₯
New vulnerabilities in GitLab, as always, several at a time. Stored XSS, CSFT, access control issue.
Search at Netlas.io:
π Link: https://nt.ls/ZXnLZ
π Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef
Read more: https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/
New vulnerabilities in GitLab, as always, several at a time. Stored XSS, CSFT, access control issue.
Search at Netlas.io:
π Link: https://nt.ls/ZXnLZ
π Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef
Read more: https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/
π₯6πΎ4
CVE-2024-6387 (and probably CVE-2006-5051): Unauthenticated RCE in OpenSSH π₯
The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.
Versions 8.5p1 to 9.8p1 ββare affected, and versions <4.4p are also potentially vulnerable.
Search at Netlas.io:
ππ» Link: https://nt.ls/ySN3C
ππ» Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)
Read more: https://www.qualys.com/regresshion-cve-2024-6387/
The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.
Versions 8.5p1 to 9.8p1 ββare affected, and versions <4.4p are also potentially vulnerable.
Search at Netlas.io:
ππ» Link: https://nt.ls/ySN3C
ππ» Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)
Read more: https://www.qualys.com/regresshion-cve-2024-6387/
π₯3πΎ3π2π€2
CVE-2024-39931: Argument Injection in Gogs, 9.9 rating π₯
The vulnerability published by SonarSource allows an attacker to delete or edit files/code stored on a vulnerable Gogs server.
Search at Netlas.io:
π Link: https://nt.ls/adMql
π Dork: http.meta:"content=\"Gogs"
Read more: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
The vulnerability published by SonarSource allows an attacker to delete or edit files/code stored on a vulnerable Gogs server.
Search at Netlas.io:
π Link: https://nt.ls/adMql
π Dork: http.meta:"content=\"Gogs"
Read more: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
π₯4πΎ3π2
CVE-2024-39929: Bypass of attachment verification in Eximβ
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
π Link: https://nt.ls/gRdtH
π Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
π Link: https://nt.ls/gRdtH
π Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
π₯5π2πΎ2
CVE-2024-5441: Arbitrary file uploads in Modern Events Calendar (WordPress plugin), 8.8 ratingβοΈ
The vulnerability allows an attacker to upload any file to the server of the affected site, which makes RCE possible. According to Wordfence, hackers are already trying to exploit this vulnerability.
Search at Netlas.io:
ππ» Link: https://nt.ls/aC1J0
ππ» Dork: http.body:"plugins/modern-events-calendar"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/id/0c007090-9d9b-4ee7-8f77-91abd4373051?source=cve
The vulnerability allows an attacker to upload any file to the server of the affected site, which makes RCE possible. According to Wordfence, hackers are already trying to exploit this vulnerability.
Search at Netlas.io:
ππ» Link: https://nt.ls/aC1J0
ππ» Dork: http.body:"plugins/modern-events-calendar"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/id/0c007090-9d9b-4ee7-8f77-91abd4373051?source=cve
πΎ5π4π₯3
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating π₯
The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.
Search at Netlas.io:
π Link: https://nt.ls/HvsUY
π Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef
Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.
Search at Netlas.io:
π Link: https://nt.ls/HvsUY
π Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef
Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
π4πΎ4π₯3
Complete Guide on Attack Surface Discovery π
Check out our latest article detailing the steps a cybersecurity researcher can follow to construct an Attack Surface using Netlas.io and other tools. Don't miss it! π₯
ππ» Read now: https://netlas.io/blog/attack_surface_discovery_guide/
Check out our latest article detailing the steps a cybersecurity researcher can follow to construct an Attack Surface using Netlas.io and other tools. Don't miss it! π₯
ππ» Read now: https://netlas.io/blog/attack_surface_discovery_guide/
netlas.io
Complete Guide on Attack Surface Discovery - Netlas Blog
A comprehensive approach to mapping your attack surface, helping you identify vulnerabilities, assess risks, and implement effective security measures.
π₯5πΎ5πΎ1
CVE-2024-34102: XXE in Magento (and Adobe Commerce), 9.8 rating π₯
Adobe eCommerce services are vulnerable to XXE, which allows an attacker to achieve arbitrary code execution. Cases of exploitation in the wild are already knownβ
Search at Netlas.io:
π Link: https://nt.ls/6inQC
π Dork: tag.name:"magento"
Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb24-40.html
Adobe eCommerce services are vulnerable to XXE, which allows an attacker to achieve arbitrary code execution. Cases of exploitation in the wild are already knownβ
Search at Netlas.io:
π Link: https://nt.ls/6inQC
π Dork: tag.name:"magento"
Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb24-40.html
π₯5πΎ5π4
Best Attack Surface Visualization Tools πΊ
Visualization of the Attack Surface is the final stage in its discovery. In this article we will talk about tools that can make this process easier π
π Read now: https://netlas.io/blog/best_attack_surface_visualization_tools/
Visualization of the Attack Surface is the final stage in its discovery. In this article we will talk about tools that can make this process easier π
π Read now: https://netlas.io/blog/best_attack_surface_visualization_tools/
netlas.io
Best Attack Surface Visualization Tools - Netlas Blog
Explore top tools that help visualize your attack surface, enabling better threat detection and improved security posture for your organization.
πΎ5π₯3π2β‘1π«‘1
Mastering Online Cameras Searching πΉ
Intrigued by global events? Live cameras offer a solution. Millions of Internet-connected devices worldwide provide real-time views of live events, like public gatherings and conflictsπ₯
IoT search engines, Google dorking, and niche websites: learn how to search online cameras around the world π
π Read now: https://netlas.io/blog/find_online_cameras/
Intrigued by global events? Live cameras offer a solution. Millions of Internet-connected devices worldwide provide real-time views of live events, like public gatherings and conflictsπ₯
IoT search engines, Google dorking, and niche websites: learn how to search online cameras around the world π
π Read now: https://netlas.io/blog/find_online_cameras/
netlas.io
Mastering Online Camera Searches - Netlas Blog
A guide on how to find exposed webcams anywhere in the world. Techniques, tools, and best practices. Examples of searching for the most popular devices.
π7β€1π1πΎ1
π Netlas v.0.24.1 is live!
Our Attack Surface Discovery Tool now supports batch node addition and drag-and-drop for easier grouping. Plus, weβve added a system theme property to control the dark/light mode.
Changelog is here: https://docs.netlas.io/changelog/
Our Attack Surface Discovery Tool now supports batch node addition and drag-and-drop for easier grouping. Plus, weβve added a system theme property to control the dark/light mode.
Changelog is here: https://docs.netlas.io/changelog/
docs.netlas.io
Changelog - Netlas Docs
Explore the latest updates, enhancements, and fixes on the Netlas platform. Stay informed with our Changelog for all product and feature developments.
π₯3π2πΎ2β€1
CVE-2024-37287: RCE in Kibana, 9.9 rating π₯
Recent vulnerability affecting multiple versions of Kibana allows an attacker to execute arbitrary code via prototype pollution.
Search at Netlas.io:
π Link: https://nt.ls/EQIov
π Dork: http.favicon.hash_sha256:30db4185530d8617e9f08858787a24b219ac5102321b48515baf5da7ac43b590
Read more: https://discuss.elastic.co/t/kibana-8-14-2-7-17-23-security-update-esa-2024-22/364424
Recent vulnerability affecting multiple versions of Kibana allows an attacker to execute arbitrary code via prototype pollution.
Search at Netlas.io:
π Link: https://nt.ls/EQIov
π Dork: http.favicon.hash_sha256:30db4185530d8617e9f08858787a24b219ac5102321b48515baf5da7ac43b590
Read more: https://discuss.elastic.co/t/kibana-8-14-2-7-17-23-security-update-esa-2024-22/364424
π₯5πΎ2
CVE-2024-43044, -43045: Arbitrary file read in Jenkins, critical rating π₯
The vulnerabilities allow an attacker to perform RCE or gain access to sensitive information.
Search at Netlas.io:
π Link: https://nt.ls/BEFsW
π Dork: http.favicon.hash_sha256:4fec1ee82f0dc4a8e4e9bb26954cf54cf9bf1e6a009516cb6c49ff16924e8caa
Vendor's advisory: https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430
The vulnerabilities allow an attacker to perform RCE or gain access to sensitive information.
Search at Netlas.io:
π Link: https://nt.ls/BEFsW
π Dork: http.favicon.hash_sha256:4fec1ee82f0dc4a8e4e9bb26954cf54cf9bf1e6a009516cb6c49ff16924e8caa
Vendor's advisory: https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430
πΎ4π₯3π2
CVE-2024-22116: RCE in Zabbix, 9.9 rating π₯
Lack of escaping for script parameters allows an attacker to execute arbitrary code.
Search at Netlas.io:
π Link: https://nt.ls/KoYW4
π Dork: http.favicon.hash_sha256:22b06a141c425c92951056805f46691c4cd8e7547ed90b8836a282950d4b4be2
Vendor's advisory: https://support.zabbix.com/browse/ZBX-25016
Lack of escaping for script parameters allows an attacker to execute arbitrary code.
Search at Netlas.io:
π Link: https://nt.ls/KoYW4
π Dork: http.favicon.hash_sha256:22b06a141c425c92951056805f46691c4cd8e7547ed90b8836a282950d4b4be2
Vendor's advisory: https://support.zabbix.com/browse/ZBX-25016
π₯4πΎ3π1
WordPress Automatic Exploit by Chirag Artaniπ₯
Our good friendβs channel posted a useful video about using Netlas to find real vulnerabilities π€
We also recommend checking out his website and Twitter for more tips:
π Site: 3rag.com
π Twitter: x.com/Chirag99Artani
Our good friendβs channel posted a useful video about using Netlas to find real vulnerabilities π€
We also recommend checking out his website and Twitter for more tips:
π Site: 3rag.com
π Twitter: x.com/Chirag99Artani
YouTube
WordPress Automatic Exploit | SSRF & Unauthenticated Arbitrary File Download | Live Recon 2024
WordPress Automatic plugin 3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files,β¦
π₯5π2