Forwarded from DailyCVE
π Spring LDAP Data Exposure Vulnerability (#CVE-2024-38820) (Moderate)
https://dailycve.com/spring-ldap-data-exposure-vulnerability-cve-2024-38820-moderate/
@Daily_CVE
https://dailycve.com/spring-ldap-data-exposure-vulnerability-cve-2024-38820-moderate/
@Daily_CVE
DailyCVE
Spring LDAP Data Exposure Vulnerability (CVE-2024-38820) (Moderate) - DailyCVE
2024-12-07 Platform: Spring LDAP Vulnerability: Data Exposure CVE: CVE-2024-38820 Severity: Moderate Date: Published: Dec 4, 2024 Last Updated: Last updated: [β¦]
Forwarded from DailyCVE
π΅ sigstore-#java: Insufficient Verification of Checkpoints (#CVE-TBD)
https://dailycve.com/sigstore-java-insufficient-verification-of-checkpoints-cve-tbd/
@Daily_CVE
https://dailycve.com/sigstore-java-insufficient-verification-of-checkpoints-cve-tbd/
@Daily_CVE
DailyCVE
sigstore-java: Insufficient Verification of Checkpoints (CVE-TBD) - DailyCVE
2024-12-07 Vulnerability sigstore-java, a Java client for interacting with sigstore infrastructure, has a flaw in its verification process. This vulnerability [β¦]
Forwarded from DailyCVE
π Unpatched ReDoS in 01x (Moderate)
https://dailycve.com/unpatched-redos-in-01x-moderate/
@Daily_CVE
https://dailycve.com/unpatched-redos-in-01x-moderate/
@Daily_CVE
DailyCVE
Unpatched ReDoS in 01x (Moderate) - DailyCVE
2024-12-07 : A moderate severity vulnerability, ReDoS, has been identified in the 0.1.x version of the `path-to-regexp` library. This vulnerability [β¦]
Forwarded from DailyCVE
π PyO3 Build Corruption Vulnerability (Moderate)
https://dailycve.com/pyo3-build-corruption-vulnerability-moderate/
@Daily_CVE
https://dailycve.com/pyo3-build-corruption-vulnerability-moderate/
@Daily_CVE
DailyCVE
PyO3 Build Corruption Vulnerability (Moderate) - DailyCVE
2024-12-07 : A vulnerability has been discovered in PyO3 versions 0.23.0 through 0.23.2, where the `PYO3_CONFIG_FILE` environment variable does not [β¦]
Forwarded from DailyCVE
π΅ linkme, Type Mismatch Vulnerability (#CVE-2024-XXXX) (Low)
https://dailycve.com/linkme-type-mismatch-vulnerability-cve-2024-xxxx-low/
@Daily_CVE
https://dailycve.com/linkme-type-mismatch-vulnerability-cve-2024-xxxx-low/
@Daily_CVE
DailyCVE
Linkme, Type Mismatch Vulnerability, CVE-2024-XXXX (Low) - DailyCVE
2024-12-04 A low-severity vulnerability has been identified in Linkme. This issue allows for the population of a DistributedSlice with elements [β¦]
Forwarded from DailyCVE
π΄ Drupal Core Denial of Service (High Severity)
https://dailycve.com/drupal-core-denial-of-service-high-severity/
@Daily_CVE
https://dailycve.com/drupal-core-denial-of-service-high-severity/
@Daily_CVE
DailyCVE
Drupal Core Denial of Service (High Severity) - DailyCVE
2024-12-07 : A critical Denial of Service (DoS) vulnerability has been discovered in Drupal Core. This vulnerability could allow an [β¦]
Forwarded from DailyCVE
π΄ Solana Web3js, Supply Chain Attack, #CVE-2024-XXXX (Critical)
https://dailycve.com/solana-web3js-supply-chain-attack-cve-2024-xxxx-critical/
@Daily_CVE
https://dailycve.com/solana-web3js-supply-chain-attack-cve-2024-xxxx-critical/
@Daily_CVE
DailyCVE
Solana Web3js, Supply Chain Attack, CVE-2024-XXXX (Critical) - DailyCVE
2024-12-07 A critical vulnerability, CVE-2024-XXXX, was recently discovered in the Solana Web3.js library. This supply chain attack exploited a compromised [β¦]
Forwarded from DailyCVE
π΄ #Django, SQL Injection, #CVE-2024-46647 (High)
https://dailycve.com/django-sql-injection-cve-2024-46647-high/
@Daily_CVE
https://dailycve.com/django-sql-injection-cve-2024-46647-high/
@Daily_CVE
DailyCVE
Django, SQL Injection, CVE-2024-46647 (High) - DailyCVE
2024-12-07 : A critical SQL injection vulnerability has been identified in specific versions of the Django framework when used with [β¦]
Forwarded from DailyCVE
π anstream, Unsoundness, GHSA-2rxc-gjrp-vjhx (Moderate)
https://dailycve.com/anstream-unsoundness-ghsa-2rxc-gjrp-vjhx-moderate/
@Daily_CVE
https://dailycve.com/anstream-unsoundness-ghsa-2rxc-gjrp-vjhx-moderate/
@Daily_CVE
DailyCVE
anstream, Unsoundness, GHSA-2rxc-gjrp-vjhx (Moderate) - DailyCVE
2024-12-07 Platform: anstream (Rust) Version: < 0.6.8 Vulnerability: Unsoundness Severity: Moderate Date: December 4, 2024 What Undercode Says: An issue [β¦]
Forwarded from DailyCVE
π #GitHub CLI, Path Traversal Vulnerability, #CVE-2024-54132 (Moderate)
https://dailycve.com/github-cli-path-traversal-vulnerability-cve-2024-54132-moderate/
@Daily_CVE
https://dailycve.com/github-cli-path-traversal-vulnerability-cve-2024-54132-moderate/
@Daily_CVE
DailyCVE
GitHub CLI, Path Traversal Vulnerability, CVE-2024-54132 (Moderate) - DailyCVE
2024-12-07 Platform: GitHub CLI Version: Not specified (versions before 2.63.1) Vulnerability: Path Traversal Severity: Moderate Date: December 3, 2024 (Published) [β¦]
Forwarded from DailyCVE
π΄ Kemp LoadMaster Unauthenticated Command Injection (#CVE-2024-1212) - Critical
https://dailycve.com/kemp-loadmaster-unauthenticated-command-injection-cve-2024-1212-critical/
@Daily_CVE
https://dailycve.com/kemp-loadmaster-unauthenticated-command-injection-cve-2024-1212-critical/
@Daily_CVE
DailyCVE
Kemp LoadMaster Unauthenticated Command Injection (CVE-2024-1212) - Critical - DailyCVE
2024-12-07 Platform: Kemp LoadMaster Version: All versions before 7.2.48.10, 7.2.54.8, 7.2.59.2 Vulnerability: Unauthenticated Command Injection Severity: Critical (CVSS v3 score: [β¦]
Forwarded from DailyCVE
π΄ Palo Alto Networks Expedition, SQL Injection Vulnerability, #CVE-2024-9465 (Critical)
https://dailycve.com/palo-alto-networks-expedition-sql-injection-vulnerability-cve-2024-9465-critical/
@Daily_CVE
https://dailycve.com/palo-alto-networks-expedition-sql-injection-vulnerability-cve-2024-9465-critical/
@Daily_CVE
DailyCVE
Palo Alto Networks Expedition, SQL Injection Vulnerability, CVE-2024-9465 (Critical) - DailyCVE
2024-12-07 : A critical SQL injection vulnerability (CVE-2024-9465) has been discovered in Palo Alto Networks Expedition. This vulnerability allows unauthenticated [β¦]
Forwarded from DailyCVE
π΄ #Oracle Agile PLM Framework Vulnerability (#CVE-2024-21287) - High Severity
https://dailycve.com/oracle-agile-plm-framework-vulnerability-cve-2024-21287-high-severity/
@Daily_CVE
https://dailycve.com/oracle-agile-plm-framework-vulnerability-cve-2024-21287-high-severity/
@Daily_CVE
DailyCVE
Oracle Agile PLM Framework Vulnerability (CVE-2024-21287) - High Severity - DailyCVE
2024-12-07 : A critical vulnerability (CVE-2024-21287) has been identified in Oracle Agile PLM Framework version 9.3.6. This vulnerability allows unauthenticated [β¦]
Forwarded from DailyCVE
π΄ ProjectSend, Improper Authentication Vulnerability, #CVE-2024-11680 (Critical)
https://dailycve.com/projectsend-improper-authentication-vulnerability-cve-2024-11680-critical/
@Daily_CVE
https://dailycve.com/projectsend-improper-authentication-vulnerability-cve-2024-11680-critical/
@Daily_CVE
DailyCVE
ProjectSend, Improper Authentication Vulnerability, CVE-2024-11680 (Critical) - DailyCVE
2024-12-07 ProjectSend, a file-sharing platform, has a critical vulnerability (CVE-2024-11680) that allows unauthenticated attackers to take control of vulnerable servers. [β¦]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Critical #Windows Zero-Day Vulnerability: Take Action Now!
https://undercodenews.com/critical-windows-zero-day-vulnerability-take-action-now/
@Undercode_News
https://undercodenews.com/critical-windows-zero-day-vulnerability-take-action-now/
@Undercode_News
UNDERCODE NEWS
Critical Windows Zero-Day Vulnerability: Take Action Now! - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π State-Sponsored Syrian Hackers Targeting North Lebanese Social Media with Fraud and Phishing
https://undercodenews.com/state-sponsored-syrian-hackers-targeting-north-lebanese-social-media-with-fraud-and-phishing/
@Undercode_News
https://undercodenews.com/state-sponsored-syrian-hackers-targeting-north-lebanese-social-media-with-fraud-and-phishing/
@Undercode_News
UNDERCODE NEWS
State-Sponsored Syrian Hackers Targeting North Lebanese Social Media with Fraud and Phishing - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ Informative #Windows 11 24H2: A Buggy #Update with a Silver Lining
https://undercodenews.com/informative-windows-11-24h2-a-buggy-update-with-a-silver-lining/
@Undercode_News
https://undercodenews.com/informative-windows-11-24h2-a-buggy-update-with-a-silver-lining/
@Undercode_News
UNDERCODE NEWS
Informative Windows 11 24H2: A Buggy Update with a Silver Lining - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Around 4k of sensitive data are leaked on the dark web from #Windows users because of NTLM vulnerability
https://undercodenews.com/around-4k-of-sensitive-data-are-leaked-on-the-dark-web-from-windows-users-because-of-ntlm-vulnerability/
@Undercode_News
https://undercodenews.com/around-4k-of-sensitive-data-are-leaked-on-the-dark-web-from-windows-users-because-of-ntlm-vulnerability/
@Undercode_News
UNDERCODE NEWS
Around 4k of sensitive data are leaked on the dark web from Windows users because of NTLM vulnerability - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Use or automate Telegram like a pro
Telegram Messenger CLI:
A command-line interface (CLI) for Telegram that allows interacting with the Telegram messaging platform directly from the terminal. It provides features like messaging, contact management, and integration with the Telegram API, making it a powerful tool for developers and automation enthusiasts.
---
### Key Features:
1. API Integration: Full access to Telegram's API and MTProto protocol.
2. Command-Line Interaction:
- Messaging.
- Managing contacts and chats.
- Forwarding and deleting messages.
3. Customization:
- Supports TAB completion and command history.
- Configurable paths for server keys and data files.
4. Cross-Platform Compatibility:
- Available for Linux, BSDs, macOS, and other Unix-like systems.
5. Extensibility:
- Python integration for scripting and automation.
---
### Installation:
#### Clone Repository:
#### Dependencies:
Install the required libraries:
- Ubuntu/Debian:
- Fedora:
- Arch Linux:
- macOS (Homebrew):
#### Build and Configure:
---
### Usage:
#### Basic Run:
#### Commands:
- Messaging:
- Contacts:
- Chats:
- Message Management:
#### Special Notes:
- Use TAB to auto-complete peer names and commands.
- Peer names:
- Users: Replace spaces with underscores (e.g.,
- Chats: Use the chat title, replacing spaces with underscores.
- Encrypted chats: Prefix with
---
### Upgrading:
When upgrading to version 1.0:
1. Binary moved to
2. Config directory updated to
3. Requires re-login due to database incompatibility.
4. Peer names now use
---
### GitHub Repository:
Find the full documentation, source code, and issue tracker here:
[Telegram CLI Repository](https://github.com/vysheng/tg)
---
This tool is ideal for automation, server-side Telegram management, and for developers looking to integrate Telegram functionality into their workflows. Let me know if you'd like further help with scripting or configuring Telegram CLI!
Telegram Messenger CLI:
A command-line interface (CLI) for Telegram that allows interacting with the Telegram messaging platform directly from the terminal. It provides features like messaging, contact management, and integration with the Telegram API, making it a powerful tool for developers and automation enthusiasts.
---
### Key Features:
1. API Integration: Full access to Telegram's API and MTProto protocol.
2. Command-Line Interaction:
- Messaging.
- Managing contacts and chats.
- Forwarding and deleting messages.
3. Customization:
- Supports TAB completion and command history.
- Configurable paths for server keys and data files.
4. Cross-Platform Compatibility:
- Available for Linux, BSDs, macOS, and other Unix-like systems.
5. Extensibility:
- Python integration for scripting and automation.
---
### Installation:
#### Clone Repository:
git clone --recursive https://github.com/vysheng/tg.git && cd tg
#### Dependencies:
Install the required libraries:
- Ubuntu/Debian:
sudo apt-get install libreadline-dev libconfig-dev libssl-dev lua5.2 liblua5.2-dev libevent-dev libjansson-dev libpython-dev make
- Fedora:
sudo dnf install lua-devel openssl-devel libconfig-devel readline-devel libevent-devel libjansson-devel python-devel
- Arch Linux:
yaourt -S telegram-cli-git
- macOS (Homebrew):
brew install libconfig readline lua python libevent jansson
export CFLAGS="-I/usr/local/include -I/usr/local/Cellar/readline/6.3.8/include"
export LDFLAGS="-L/usr/local/lib -L/usr/local/Cellar/readline/6.3.8/lib"
#### Build and Configure:
./configure
make
---
### Usage:
#### Basic Run:
bin/telegram-cli -k tg-server.pub
#### Commands:
- Messaging:
msg <peer> <Text>
fwd <user> <msg-seqno>
mark_read <peer>
- Contacts:
add_contact <phone-number> <first-name> <last-name>
rename_contact <user> <first-name> <last-name>
- Chats:
chat_with_peer <peer>
- Message Management:
delete_msg <msg-seqno>
restore_msg <msg-seqno>
#### Special Notes:
- Use TAB to auto-complete peer names and commands.
- Peer names:
- Users: Replace spaces with underscores (e.g.,
John_Doe).- Chats: Use the chat title, replacing spaces with underscores.
- Encrypted chats: Prefix with
! (e.g., !John_Doe).---
### Upgrading:
When upgrading to version 1.0:
1. Binary moved to
./bin and renamed to telegram-cli.2. Config directory updated to
${HOME}/.telegram-cli.3. Requires re-login due to database incompatibility.
4. Peer names now use
@ instead of #.---
### GitHub Repository:
Find the full documentation, source code, and issue tracker here:
[Telegram CLI Repository](https://github.com/vysheng/tg)
---
This tool is ideal for automation, server-side Telegram management, and for developers looking to integrate Telegram functionality into their workflows. Let me know if you'd like further help with scripting or configuring Telegram CLI!
GitHub
GitHub - vysheng/tg: telegram-cli
telegram-cli. Contribute to vysheng/tg development by creating an account on GitHub.