Netlas.io
2.02K subscribers
345 photos
3 videos
470 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
Using theHarvester with the Netlas Module πŸ”

In our latest article, we demonstrate how to leverage the theHarvester framework integrated with Netlas to efficiently discover subdomains.

πŸ‘‰ Read now: https://netlas.io/blog/theharvester_and_netlas/
πŸ‘Ύ3πŸ”₯2πŸ‘2
Minor App Improvements πŸ”₯

In the 1.0.9 update, we made some fixes aimed at increasing the stability of the application and improving the user experience.

Here’s what’s new:
πŸ–Š
Optimized the autocomplete feature.
πŸ“Š Added status page and link on it in the footer.
πŸ› Fixed some bugs and issues.
πŸ–₯ A few other minor improvements.

πŸ‘‰ Read more: https://docs.netlas.io/changelog/
πŸ‘Ύ3πŸ‘2
Tomorrow the new year will begin, and Netlas wants to share with you some statistics of the outgoing year! πŸŽ„

This year we achieved the following:

πŸ‘‰ Total requests: 15,552,390
πŸ‘‰ New users: 16,633
πŸ‘‰ Total coins spent: 474,734,108
πŸ‘‰ Total graphs stored: 1,165
πŸ‘‰ Total private scans was started: 789

πŸ“– Most popular article: https://netlas.io/blog/attack_surface_discovery_guide/
❗ Most popular CVE post: CVE-2024-6387 (https://x.com/Netlas_io/status/1807760965967937826)

Thank you for being with us. The Netlas team wishes you success in your projects, safe surfaces, fast pentests and all the best. See you next year!
1πŸŽ„4πŸ‘Ύ2β˜ƒ1
CVE-2025-0282, -0283: Two vulnerabilities in Ivanti Connect Secure, 7.0 - 9.0 rating πŸ”₯

Stack-based buffer overflow caused potential RCE and privilege escalation.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/WMQwN
πŸ‘‰ Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US
πŸ‘Ύ4πŸ‘2πŸ”₯1
CVE-2025-22777: Privilege Escalation in GiveWP WordPress Plugin, 9.8 rating πŸ”₯

Unauthenticated PHP Object Injection allows attackers to take control of websites.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/amyWM
πŸ‘‰ Dork: http.body:"plugins/give/assets/dist"

Read more: https://patchstack.com/articles/critical-vulnerability-patched-in-givewp-plugin/
πŸ”₯3πŸ‘Ύ2
CVE-2025-21598: Out-of-bounds Read in Juniper Junos OS, 8.2 rating❗️

An out-of-bouds read vulnerability in the RDP daemon, fixed last week, could potentially lead to DoS.

Search at
Netlas.io:
πŸ‘‰ Link: https://nt.ls/HqWq2
πŸ‘‰ Dork: http.title:"Juniper"

Vendor's advisory: https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-traceoptions-are-configured-receipt-of-malformed-BGP-packets-causes-RPD-to-crash-CVE-2025-21598
πŸ‘2πŸ”₯2πŸ‘Ύ1
CVE-2025-0066, -0070 and other: Multiple vulnarabilities in SAP, 2.2 - 9.9 rating πŸ”₯πŸ”₯πŸ”₯

Several vulnerabilities in SAP services for every taste and color: SQLi, Improper Authentication, DLL Hijacking, etc.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/zbP5e
πŸ‘‰ Dork: http.headers.server:"SAP"

Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/january-2025.html
πŸ”₯6πŸ‘Ύ3
CVE-2024-12365: Missing Authorization in W3 Total Cache WordPress Plugin, 8.5 rating❗️

The vulnerability allows an authenticated attacker to access sensitive data and make unauthorized web requests to collect information from internal services.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/BpOAJ
πŸ‘‰ Dork: http.body:"plugins/w3-total-cache"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/w3-total-cache/w3-total-cache-281-authenticated-subscriber-missing-authorization-to-server-side-request-forgery
πŸ‘Ύ3πŸ”₯2
CVE-2025-23051, -23052: Vulnerabilities in ArubaOS, 7.2 rating❗️

The vulnerabilities allow an attacker to inject commands and overwrite system files.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/7pU9N
πŸ‘‰ Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04723en_us&docLocale=en_US
πŸ‘Ύ3πŸ”₯2
CVE-2024-57726, -57727, -57728: Multiple vulnerabilities in SimpleHelp, 7.2 - 8.8 rating❗️

The vulnerabilities allow attackers to upload arbitrary files to the SimpleHelp server, as well as escalate privileges, which together allows RCE to be carried out.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Frx6H
πŸ‘‰ Dork: http.headers.server:"SimpleHelp"

Vendor's advisory: https://simple-help.com/kb---security-vulnerabilities-01-2025#
πŸ‘Ύ3πŸ”₯2
CVE-2025-21535: Server Takeover in Oracle WebLogic, 9.8 rating πŸ”₯

An easily exploitable vulnerability in the Core component allows an unauthenticated attacker to remotely compromise a WebLogic server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/6EpWK
πŸ‘‰ Dork: protocol:t3 OR protocol:t3s

Vendor's advisory: https://www.oracle.com/security-alerts/cpujan2025.html#AppendixFMW
1πŸ”₯4πŸ‘Ύ3❀1
CVE-2025-0314 and other: Multiple vulnerabilities in GitLab, 4.3 - 8.7 rating❗️

In a recent advisory, GitLab writed about three vulnerabilities, including stored XSS, resource exhaustion, and protected CI/CD variables exfiltration.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/BNKS8
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/01/22/patch-release-gitlab-17-8-1-released/
πŸ‘Ύ3❀1πŸ‘1
CVE-2025-23006: Deserialization of Untrusted Data in SonicWall SMA1000, 9.8 rating πŸ”₯

A pre-authentication deserialization of untrusted data vulnerability was detected in SMA1000 components, which could allow an attacker to execute OS commands.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/FLFJT
πŸ‘‰ Dork: http.headers.server:"SMA"

Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
πŸ”₯5πŸ‘4πŸ‘Ύ2❀1
CVE-2024-55573, -53923: SQLi in Centreon, 9.1 rating πŸ”₯

The vulnerabilities allow an attacker with high privileges to perform SQL injection into a form for uploading media.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/NETLB
πŸ‘‰ Dork: http.favicon.hash_sha256:795c0f8c1ff23b992d6ccb91df5e6488d4c259585da58b2e2f8eeee71147516a OR http.favicon.hash_sha256:c95e0dc8a2cc9a45d29c5381e62e48bde88f661408d4b811e72933fa7da32d4e

Vendor's advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-55573-centreon-web-critical-severity-4264
πŸ”₯3πŸ‘2πŸ‘Ύ2
CVE-2025-22609, -22611, -22612: Multiple vulnerabilities in Coolify, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

Three vulnerabilities of highest severity in Coolify allow for RCE, privilege escalation, and authentication bypass.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/vUWWf
πŸ‘‰ Dork: http.favicon.hash_sha256:eaf648b6000a49599ed58bda49e576d0f981e535a8075d524a4be890edcf96d0 AND uri:*login*

Vendor's advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9
πŸ”₯4πŸ‘Ύ3❀1
🚧 Planned Maintenance 🚧
The application will be unavailable for a period of time❗️

The maintenance is scheduled to start on February 02, 2025, at 07:00 UTC ⏰. It is expected to take a couple of hours, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
πŸ‘2πŸ’Š2πŸ‘¨β€πŸ’»1
CVE-2024-11187, -12705: Vulnerabilities in BIND DNS Software, 7.5 rating❗️

Two vulnerabilities in BIND allow DoS against DNS servers, which can be a preparatory step before the main attacks.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/bGSFv
πŸ‘‰ Dork: dns.banner:"BIND" OR dns_tcp.banner:"BIND"

Read more: https://kb.isc.org/docs/cve-2024-12705
πŸ”₯3πŸ‘Ύ3πŸ‘2
🚧 Planned Maintenance 🚧

We remind you, at 07:00 UTC the application will become temporarily unavailable. The work will take a couple of hours, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
❀2
🚧 Planned Maintenance 🚧

We remind you that the planned work will begin in an hour, at 07:00 UTC. Our team will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
πŸ’Š2πŸ‘¨β€πŸ’»1
πŸ’― Planned Maintenance completed πŸ’―

Netlas is fully online again and you can get back to your projects! πŸ‘Ύ
❀2πŸ‘Ύ2πŸ‘1πŸ‘Ž1
CVE-2024-56529: Session Fixation in Mailcow, 7.5 rating❗️

The application does not disable old session IDs, which allows a remote attacker to use existing IDs in the victim's browser.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/AuyJw
πŸ‘‰ Dork: http.title:"mailcow UI"

Vendor's advisory: https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-23c8-4wwr-g3c6
πŸ‘2πŸ”₯2πŸ‘Ύ2