Netlas.io
2.02K subscribers
345 photos
3 videos
470 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
CVE-2024-11187, -12705: Vulnerabilities in BIND DNS Software, 7.5 ratingโ—๏ธ

Two vulnerabilities in BIND allow DoS against DNS servers, which can be a preparatory step before the main attacks.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/bGSFv
๐Ÿ‘‰ Dork: dns.banner:"BIND" OR dns_tcp.banner:"BIND"

Read more: https://kb.isc.org/docs/cve-2024-12705
๐Ÿ”ฅ3๐Ÿ‘พ3๐Ÿ‘2
๐Ÿšง Planned Maintenance ๐Ÿšง

We remind you, at 07:00 UTC the application will become temporarily unavailable. The work will take a couple of hours, and we will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
โค2
๐Ÿšง Planned Maintenance ๐Ÿšง

We remind you that the planned work will begin in an hour, at 07:00 UTC. Our team will do our best to complete it as quickly as possible.

Please remember to save your work before this time.
๐Ÿ’Š2๐Ÿ‘จโ€๐Ÿ’ป1
๐Ÿ’ฏ Planned Maintenance completed ๐Ÿ’ฏ

Netlas is fully online again and you can get back to your projects! ๐Ÿ‘พ
โค2๐Ÿ‘พ2๐Ÿ‘1๐Ÿ‘Ž1
CVE-2024-56529: Session Fixation in Mailcow, 7.5 ratingโ—๏ธ

The application does not disable old session IDs, which allows a remote attacker to use existing IDs in the victim's browser.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/AuyJw
๐Ÿ‘‰ Dork: http.title:"mailcow UI"

Vendor's advisory: https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-23c8-4wwr-g3c6
๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ‘พ2
Unauthorized Data Upload in Alibaba Cloud โ€“ PoC by Chirag Artani ๐Ÿ”ฅ

A new video is out on our friendโ€™s channel, showcasing the discovery of a fresh vulnerability. The video includes an interesting query and a practical example of exploitation. Donโ€™t miss it! ๐Ÿ”

We also recommend checking out Chirag Artaniโ€™s website and Twitter for more cybersecurity insights:

๐Ÿ‘‰ Website: 3rag.com
๐Ÿ‘‰ Twitter: x.com/Chirag99Artani
โค3๐Ÿ‘พ3
CVE-2025-0890, -40890, -40891: Vulnerabilities in Zyxel CPE, 8.8 - 9.8 rating ๐Ÿ”ฅ

The vulnerabilities include two OS Command Injections, and Improper Authentication via Telnet.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/Lxf7h
๐Ÿ‘‰ Dork: telnet.banner:"Zyxel VDSL"

Vendor's advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025
๐Ÿ”ฅ4๐Ÿ‘3๐Ÿ‘พ2
CVE-2024-13487: Code Injection in The CURCY WooCommerce Plugin, 7.3 ratingโ—๏ธ

The vulnerability allows unauthenticated users to execute arbitrary shortcodes into popular free currency exchange plugin.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/QhoHC
๐Ÿ‘‰ Dork: http.body:"plugins/woo-multi-currency"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woo-multi-currency/curcy-multi-currency-for-woocommerce-225-unauthenticated-arbitrary-shortcode-execution-via-get-products-price-function
๐Ÿ‘3๐Ÿ‘พ3
๐Ÿšง Storage Maintenance ๐Ÿšง

We are currently performing maintenance to scale up storage capacity. The private scanner may be unavailable for the next 24-48 hours. The Netlas team apologizes for the inconvenience.

We will do our best to complete it as quickly as possible.
๐Ÿ‘Œ2๐Ÿ‘จโ€๐Ÿ’ป2
Netlas vs Censys: A Comprehensive Analysis ๐Ÿงฎ

A new article in our series of comparisons with competitors.

This time we evaluated the pros and cons of Censys, which proved to be the strongest of our opponents. However, we tried to evaluate both search engines as honestly as possible, using 10+ key indicators.

๐Ÿ‘‰ Read now: https://netlas.io/blog/netlas_vs_censys/
๐Ÿ‘4๐Ÿ‘พ4โค3
CVE-2025-25064, -25065: Two vulnerabilities in Zimbra, 5.3 - 9.8 rating ๐Ÿ”ฅ

Vulnerabilities include SQL injection and SSRF, which could potentially lead to RCE. We recommend installing the latest patches as soon as possible.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/nehV7
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637 OR \*.banner:"Zimbra"

Vendor's advisory: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
๐Ÿ”ฅ3๐Ÿ‘พ2
CVE-2025-22467: RCE in Ivanti Connect Secure, 9.9 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

A stack-based buffer overflow in Ivanti Connect Secure allows a remote authenticated attacker to achieve remote code execution.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/WojuE
๐Ÿ‘‰ Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US
๐Ÿ”ฅ6๐Ÿ‘2๐Ÿ‘พ1
CVE-2025-0376 and other: Multiple vulnerabilitites in GitLab, 4.2 - 8.7 ratingโ—๏ธ

With the new release, GitLab has disclosed several vulnerabilities, including XSS injection, DoS and others.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/50gFr
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/
๐Ÿ”ฅ3๐Ÿ‘พ3๐Ÿ‘1
CVE-2025-1094: Improper Neutralization of Quoting Syntax in PostgreSQL functions, 8.1 ratingโ—๏ธ

A vulnerability in some functions of the libpq library allows SQL injection.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/EtVPc
๐Ÿ‘‰ Dork: postgres:*

Vendor's advisory: https://www.postgresql.org/support/security/CVE-2025-1094/
๐Ÿ”ฅ3โค2๐Ÿ‘พ2
CVE-2024-12562: Deserialization of Untrusted Data in s2member Pro WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

The vulnerability allows attackers to inject PHP Object on all versions of the plugin, except the latest.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/GqND6
๐Ÿ‘‰ Dork: http.body:"plugins/s2member"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member-pro/s2member-pro-241216-unauthenticated-php-object-injection
๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ‘พ1
CVE-2025-26465, -26466: Two vulnerabilities in OpenSSH, 6.8 ratingโ—๏ธ

MitM and DoS in OpenSSH. The severity level is medium, but the vulnerabilities cover many versions: from 2013 for -26465 and from 2023 for -26466.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/1TTrj
๐Ÿ‘‰ Dork: ssh.server_key_exchange.client_to_server_compression:"[email protected]"

Read more: https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466
๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ‘พ1
๐Ÿ” Track Adversary Infrastructure Challenge
Join the challenge by Netlas and RST Cloud to improve your threat-hunting skills.

- Learn to detect C2 servers and investigate real threats.
- Compete for prizes: ๐Ÿ† $1000, ๐Ÿฅˆ $500, ๐Ÿฅ‰ $250.
- Top 10 winners receive Netlas Annual Business Subscription and RST IoC Lookup Subscription.
- All participants get a certificate of completion.
- Free 1-month access to Netlas for practice.

๐Ÿ’ก Whatโ€™s included:
- Webinar on threat intelligence and C2 tracking.
- Hands-on challenge with Netlas and RST Cloud tools.
- Discord community for support and collaboration.

๐Ÿ‘‰ Invite a friend to team up and participate: https://netlas.io/promo/ti-challenge/
๐Ÿ‘พ5โค4๐Ÿ”ฅ3
CVE-2025-23209: Code Injection in CraftCMS, 8.1 ratingโ—๏ธ

Craft CMS contains a code injection vulnerability that allows for remote code execution as vulnerable versions have compromised user security keys.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/brxoj
๐Ÿ‘‰ Dork: http.headers.x_powered_by:"Craft CMS"

Vendor's advisory: https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x
โค2๐Ÿ”ฅ2๐Ÿ‘พ2
Netlas.io pinned ยซ๐Ÿ” Track Adversary Infrastructure Challenge Join the challenge by Netlas and RST Cloud to improve your threat-hunting skills. - Learn to detect C2 servers and investigate real threats. - Compete for prizes: ๐Ÿ† $1000, ๐Ÿฅˆ $500, ๐Ÿฅ‰ $250. - Top 10 winners receiveโ€ฆยป
CVE-2025-26794: SQL Injection in Exim 4.98, 7.5 ratingโ—๏ธ

A vulnerability in the Exim mail transfer agent could allow a remote attacker to perform SQL injection.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/ge4Iy
๐Ÿ‘‰ Dork: smtp.banner:"Exim 4.98"

Vendor's advisory: https://www.exim.org/static/doc/security/CVE-2025-26794.txt
๐Ÿ‘พ3๐Ÿ”ฅ2๐Ÿ‘1
CVE-2025-1128: RCE in Everest Forms WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

The vulnerability allows an unauthenticated attacker to perform a wide range of actions with the site: upload arbitrary files, RCE, delete config files.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/q6pgJ
๐Ÿ‘‰ Dork: http.body:"plugins/everest-forms"

Read more: https://www.wordfence.com/blog/2025/02/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin/
๐Ÿ”ฅ3๐Ÿ‘พ2๐Ÿ‘1