Forwarded from DailyCVE
π΅Unpatched weak password vulnerability exists in the firewall gateway management system:
https://dailycve.com/unpatched-weak-password-vulnerability-exists-firewall-gateway-management-system
https://dailycve.com/unpatched-weak-password-vulnerability-exists-firewall-gateway-management-system
Dailycve
Unpatched weak password vulnerability exists in the firewall gateway management system | CVE
Details:
Youyou is a registered trademark of Shenzhen Hechen Technology Communication Co., Ltd. In 1998, the company was founded. Mailgard Youyou series mail server, mail archive, spam filtering gateway, mail gateway, global mail gateway, gateway forβ¦
Forwarded from DailyCVE
π΅Unpatched Information disclosure vulnerability exists in DedeCMSV6:
https://dailycve.com/unpatched-information-disclosure-vulnerability-exists-dedecmsv6
https://dailycve.com/unpatched-information-disclosure-vulnerability-exists-dedecmsv6
Dailycve
Unpatched Information disclosure vulnerability exists in DedeCMSV6 | CVE
Details:
DedeCMSV6 is developed based on PHP7.x, is extensible, and is completely open source.
DedeCMSV6 has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain sensitive information
Affected Version:
DEDECMSV6 6.0.2β¦
Forwarded from UNDERCODE NEWS
The Russian authorities want licenses to be enforced for calls via Skype, Viber, WhatsApp
#International
#International
Forwarded from UNDERCODE NEWS
In the US, Xiaomi has fallen out of favour. Now, along with Huawei, she is on the "black list"
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2021 release: Added New Tools
Reverse Engineering
RAT Tools
Web Crawling
Payload Injector
Multitor Tools update
Added Tool in wifijamming
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Z4nzu/hackingtool.git
2) chmod -R 755 hackingtool
3) cd hackingtool
4) sudo pip3 install -r requirement.txt
5) bash install.sh
6) sudo hackingtool
7) choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2021 release: Added New Tools
Reverse Engineering
RAT Tools
Web Crawling
Payload Injector
Multitor Tools update
Added Tool in wifijamming
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Z4nzu/hackingtool.git
2) chmod -R 755 hackingtool
3) cd hackingtool
4) sudo pip3 install -r requirement.txt
5) bash install.sh
6) sudo hackingtool
7) choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Z4nzu/hackingtool: ALL IN ONE Hacking Tool For Hackers
ALL IN ONE Hacking Tool For Hackers. Contribute to Z4nzu/hackingtool development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Support & Share undercode telegram links:
T.me/UndercodeUpdates
T.me/UndercodeTesting
T.me/DailyCve
T.me/UndercodeNews
t.me/UndercodeChat
T.me/Undercode_Testing
Enjoy & Stay safe !
For feedback: Feedback@Undercode.help
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Support & Share undercode telegram links:
T.me/UndercodeUpdates
T.me/UndercodeTesting
T.me/DailyCve
T.me/UndercodeNews
t.me/UndercodeChat
T.me/Undercode_Testing
Enjoy & Stay safe !
For feedback: Feedback@Undercode.help
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE TESTING
π΅Discourse security vulnerability (DC: 200 -2021)
https://dailycve.com/discourse-security-vulnerability
https://dailycve.com/discourse-security-vulnerability
Dailycve
Discourse security vulnerability | CVE
Details:
Discourse is a dialogue forum for an open source culture. Apps such as group, email and chat rooms are included in the platform. Discourse 2.7.0 by beta1 has a security weakness resulting from the dependency of 2FA on such rate-limit types.
β¦
Forwarded from UNDERCODE TESTING
π΅multiple SOOIL Developments products:
https://dailycve.com/multiple-sooil-developments-products-0
https://dailycve.com/multiple-sooil-developments-products-0
Dailycve
multiple SOOIL Developments products | CVE
Details:
The expected impact depends on each vulnerability, but it may be affected as follows.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Bottle deployment method of web service and postman interface:
Bottle is a fast, concise, and lightweight WSIG-based micro web framework. This framework consists of only one .py file and does not depend on any other modules except the Python standard library.
from bottle import route, request, run<font></font>
import requests<font></font>
import cv2<font></font>
import numpy as np<font></font>
<font></font>
@route('/testimg',method='POST')#<font></font>
def testimg():<font></font>
try:<font></font>
params<font></font>
result = {}<font></font>
result["name"] = request.query.name#<font></font>
result["nums"] = request.query.nums<font></font>
<font></font>
#json<font></font>
#print(request.json)<font></font>
urllist = request.json["urllist"]<font></font>
#print(type(urllist))<font></font>
#print(urllist)<font></font>
imgPath = []<font></font>
for i in range(len(urllist)):<font></font>
imgPath.append(urllist[i])<font></font>
<font></font>
for i in range(len(imgPath)):<font></font>
#print(imgPath[i])<font></font>
#url<font></font>
rev = requests.get(imgPath[i], verify=False) # , timeout=config.timeout<font></font>
img = cv2.imdecode(np.frombuffer(rev.content, np.uint8), cv2.IMREAD_COLOR) # η<font></font>
rec = 0<font></font>
<font></font>
return str(rec)<font></font>
except BaseException as e:<font></font>
logger.exception(e)<font></font>
return str(0)<font></font>
<font></font>
if name == "main":<font></font>
<font></font>
run(host='172.17.0.2', port=49166, debug=False)
Postman interface test.
params passes parameters.
The body transmits text data such as json.
@Phenicia
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Bottle deployment method of web service and postman interface:
Bottle is a fast, concise, and lightweight WSIG-based micro web framework. This framework consists of only one .py file and does not depend on any other modules except the Python standard library.
from bottle import route, request, run<font></font>
import requests<font></font>
import cv2<font></font>
import numpy as np<font></font>
<font></font>
@route('/testimg',method='POST')#<font></font>
def testimg():<font></font>
try:<font></font>
params<font></font>
result = {}<font></font>
result["name"] = request.query.name#<font></font>
result["nums"] = request.query.nums<font></font>
<font></font>
#json<font></font>
#print(request.json)<font></font>
urllist = request.json["urllist"]<font></font>
#print(type(urllist))<font></font>
#print(urllist)<font></font>
imgPath = []<font></font>
for i in range(len(urllist)):<font></font>
imgPath.append(urllist[i])<font></font>
<font></font>
for i in range(len(imgPath)):<font></font>
#print(imgPath[i])<font></font>
#url<font></font>
rev = requests.get(imgPath[i], verify=False) # , timeout=config.timeout<font></font>
img = cv2.imdecode(np.frombuffer(rev.content, np.uint8), cv2.IMREAD_COLOR) # η<font></font>
rec = 0<font></font>
<font></font>
return str(rec)<font></font>
except BaseException as e:<font></font>
logger.exception(e)<font></font>
return str(0)<font></font>
<font></font>
if name == "main":<font></font>
<font></font>
run(host='172.17.0.2', port=49166, debug=False)
Postman interface test.
params passes parameters.
The body transmits text data such as json.
@Phenicia
β β β Uππ»βΊπ«Δπ¬πβ β β β