Forwarded from DailyCVE
π΅Unpatched Information disclosure vulnerability exists in DedeCMSV6:
https://dailycve.com/unpatched-information-disclosure-vulnerability-exists-dedecmsv6
https://dailycve.com/unpatched-information-disclosure-vulnerability-exists-dedecmsv6
Dailycve
Unpatched Information disclosure vulnerability exists in DedeCMSV6 | CVE
Details:
DedeCMSV6 is developed based on PHP7.x, is extensible, and is completely open source.
DedeCMSV6 has an information disclosure vulnerability. Attackers can use vulnerabilities to obtain sensitive information
Affected Version:
DEDECMSV6 6.0.2β¦
Forwarded from UNDERCODE NEWS
The Russian authorities want licenses to be enforced for calls via Skype, Viber, WhatsApp
#International
#International
Forwarded from UNDERCODE NEWS
In the US, Xiaomi has fallen out of favour. Now, along with Huawei, she is on the "black list"
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2021 release: Added New Tools
Reverse Engineering
RAT Tools
Web Crawling
Payload Injector
Multitor Tools update
Added Tool in wifijamming
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Z4nzu/hackingtool.git
2) chmod -R 755 hackingtool
3) cd hackingtool
4) sudo pip3 install -r requirement.txt
5) bash install.sh
6) sudo hackingtool
7) choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2021 release: Added New Tools
Reverse Engineering
RAT Tools
Web Crawling
Payload Injector
Multitor Tools update
Added Tool in wifijamming
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Z4nzu/hackingtool.git
2) chmod -R 755 hackingtool
3) cd hackingtool
4) sudo pip3 install -r requirement.txt
5) bash install.sh
6) sudo hackingtool
7) choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Z4nzu/hackingtool: ALL IN ONE Hacking Tool For Hackers
ALL IN ONE Hacking Tool For Hackers. Contribute to Z4nzu/hackingtool development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Support & Share undercode telegram links:
T.me/UndercodeUpdates
T.me/UndercodeTesting
T.me/DailyCve
T.me/UndercodeNews
t.me/UndercodeChat
T.me/Undercode_Testing
Enjoy & Stay safe !
For feedback: Feedback@Undercode.help
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Support & Share undercode telegram links:
T.me/UndercodeUpdates
T.me/UndercodeTesting
T.me/DailyCve
T.me/UndercodeNews
t.me/UndercodeChat
T.me/Undercode_Testing
Enjoy & Stay safe !
For feedback: Feedback@Undercode.help
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE TESTING
π΅Discourse security vulnerability (DC: 200 -2021)
https://dailycve.com/discourse-security-vulnerability
https://dailycve.com/discourse-security-vulnerability
Dailycve
Discourse security vulnerability | CVE
Details:
Discourse is a dialogue forum for an open source culture. Apps such as group, email and chat rooms are included in the platform. Discourse 2.7.0 by beta1 has a security weakness resulting from the dependency of 2FA on such rate-limit types.
β¦
Forwarded from UNDERCODE TESTING
π΅multiple SOOIL Developments products:
https://dailycve.com/multiple-sooil-developments-products-0
https://dailycve.com/multiple-sooil-developments-products-0
Dailycve
multiple SOOIL Developments products | CVE
Details:
The expected impact depends on each vulnerability, but it may be affected as follows.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Bottle deployment method of web service and postman interface:
Bottle is a fast, concise, and lightweight WSIG-based micro web framework. This framework consists of only one .py file and does not depend on any other modules except the Python standard library.
from bottle import route, request, run<font></font>
import requests<font></font>
import cv2<font></font>
import numpy as np<font></font>
<font></font>
@route('/testimg',method='POST')#<font></font>
def testimg():<font></font>
try:<font></font>
params<font></font>
result = {}<font></font>
result["name"] = request.query.name#<font></font>
result["nums"] = request.query.nums<font></font>
<font></font>
#json<font></font>
#print(request.json)<font></font>
urllist = request.json["urllist"]<font></font>
#print(type(urllist))<font></font>
#print(urllist)<font></font>
imgPath = []<font></font>
for i in range(len(urllist)):<font></font>
imgPath.append(urllist[i])<font></font>
<font></font>
for i in range(len(imgPath)):<font></font>
#print(imgPath[i])<font></font>
#url<font></font>
rev = requests.get(imgPath[i], verify=False) # , timeout=config.timeout<font></font>
img = cv2.imdecode(np.frombuffer(rev.content, np.uint8), cv2.IMREAD_COLOR) # η<font></font>
rec = 0<font></font>
<font></font>
return str(rec)<font></font>
except BaseException as e:<font></font>
logger.exception(e)<font></font>
return str(0)<font></font>
<font></font>
if name == "main":<font></font>
<font></font>
run(host='172.17.0.2', port=49166, debug=False)
Postman interface test.
params passes parameters.
The body transmits text data such as json.
@Phenicia
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Bottle deployment method of web service and postman interface:
Bottle is a fast, concise, and lightweight WSIG-based micro web framework. This framework consists of only one .py file and does not depend on any other modules except the Python standard library.
from bottle import route, request, run<font></font>
import requests<font></font>
import cv2<font></font>
import numpy as np<font></font>
<font></font>
@route('/testimg',method='POST')#<font></font>
def testimg():<font></font>
try:<font></font>
params<font></font>
result = {}<font></font>
result["name"] = request.query.name#<font></font>
result["nums"] = request.query.nums<font></font>
<font></font>
#json<font></font>
#print(request.json)<font></font>
urllist = request.json["urllist"]<font></font>
#print(type(urllist))<font></font>
#print(urllist)<font></font>
imgPath = []<font></font>
for i in range(len(urllist)):<font></font>
imgPath.append(urllist[i])<font></font>
<font></font>
for i in range(len(imgPath)):<font></font>
#print(imgPath[i])<font></font>
#url<font></font>
rev = requests.get(imgPath[i], verify=False) # , timeout=config.timeout<font></font>
img = cv2.imdecode(np.frombuffer(rev.content, np.uint8), cv2.IMREAD_COLOR) # η<font></font>
rec = 0<font></font>
<font></font>
return str(rec)<font></font>
except BaseException as e:<font></font>
logger.exception(e)<font></font>
return str(0)<font></font>
<font></font>
if name == "main":<font></font>
<font></font>
run(host='172.17.0.2', port=49166, debug=False)
Postman interface test.
params passes parameters.
The body transmits text data such as json.
@Phenicia
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅Linux kernel security vulnerabilities:
https://dailycve.com/linux-kernel-security-vulnerabilities
https://dailycve.com/linux-kernel-security-vulnerabilities
Dailycve
Linux kernel security vulnerabilities | CVE
Details:
The Linux kernel is the kernel that Linux, the Linux Foundation's open source operating system, uses. In the Linux kernel, there is a safety flaw that stems from a null pointer error in spk ttyio receive buf2.
The Fix:
Update your kernelβ¦
Forwarded from DailyCVE
π΅Unpatched! All-around video format converter has dll hijacking vulnerability:
https://dailycve.com/unpatched-all-around-video-format-converter-has-dll-hijacking-vulnerability
https://dailycve.com/unpatched-all-around-video-format-converter-has-dll-hijacking-vulnerability
Dailycve
Unpatched! All-around video format converter has dll hijacking vulnerability | CVE
Details:
Jiajia Universal Video Format Converter is a video format converter that is professional, simple to run and insightful.
The Jiajia Universal Video Format Converter is vulnerable to DLL hijacking. The loaded DLL is not signed and checked untilβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Amazon will allow other businesses to grow Alexa voice assistants from closed to open.
#International
#International