Netlas.io
2.02K subscribers
342 photos
3 videos
466 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
πŸ”₯ Netlas.io Discord server πŸ”₯

Engage in live chat with our community on Discord!

Here you can quickly get answers to important questions, talk with other users, and read the latest news in a new convenient format.

πŸ‘‰ Follow the link: https://nt.ls/discord
πŸ‘Ύ6πŸ‘5
Netlas.io pinned Β«πŸ”₯ Netlas.io Discord server πŸ”₯ Engage in live chat with our community on Discord! Here you can quickly get answers to important questions, talk with other users, and read the latest news in a new convenient format. πŸ‘‰ Follow the link: https://nt.ls/discordΒ»
CVE-2024-21006: Vulnerability in Oracle WebLogic Server, 7.5 rating❗

Vulnerability from the report on the new Oracle patch. Allows an unauthenticated attacker to gain unauthorized access to critical activities. According to NVD, exploitation is quite simple.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/RrPD2
πŸ‘‰ Dork: port:7001 AND protocol:t3

Read more: https://nvd.nist.gov/vuln/detail/CVE-2024-21006
πŸ‘Ύ5πŸ”₯4πŸ‘3
Business-focused OSINT with Netlas.io πŸ”Ž

Our new article is devoted to researching company resources using Netlas tools.
It shows how to collect contacts, files, explore subnets and much more. Read it quickly!

πŸ‘‰ Read here: https://nt.ls/osint
πŸ‘Ύ5πŸ”₯3πŸ‘€1
Good news πŸ”₯

Yesterday we fixed three bugs in subscription system that were discovered during the penetration testing.

Now Netlas has become even safer!

πŸ‘‰πŸ» Changelog: https://docs.netlas.io/changelog/
πŸ‘Ύ5πŸ‘2
New vulnerability in CrushFTP, "serious" rating πŸ”₯

The vulnerability, which does not yet have a CVE, was discovered in CrushFTP. According to the vendor's report, its use could allow an attacker to leave the VFS and download system files. Moreover, the vulnerability has already been used in real attacks!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/5fGPm
πŸ‘‰πŸ» Dork: http.headers.server:"CrushFTP"

Vendor's advisory: https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update
πŸ‘5πŸ‘Ύ4πŸ”₯3πŸ’‹1
CVE-2024-20356: Command Injection in Cisco Integrated Management Controller, 8.7 rating πŸ”₯

The vulnerability allows attacker to inject almost any code, as demonstrated by the example of the launch of Doom (oh yes, now on Cisco)!

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/WixwE
πŸ‘‰πŸ» Dork: http.title:"Cisco Integrated Management Controller"

Read more: https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/
πŸ”₯4😁4πŸ‘Ύ4πŸ’‹1
pfSense-SA-24_04: XSS in pfSense Plus and pfSense CE❗

A vulnerability was discovered in the jquery-treegrid library that could cause arbitrary JavaScript code to be executed in the user's browser.
According to the vendor's advisory, the library is used for testing only and can be safely disabled.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/E5AZ1
πŸ‘‰ Dork: http.title:"pfSense - Login" OR http.title:"pfSense Plus"

Vendor's advisory: https://docs.netgate.com/downloads/pfSense-SA-24_04.webgui.asc
πŸ‘4πŸ‘Ύ4πŸ”₯2πŸ’‹1
πŸš€ Webinar by Our Partners: The Art and Science of C2: Veni, non vidi, non vici?

This May 7th, join our partners as they demonstrate detecting and analyzing C2 servers with Netlas. Expert insights and real-time demonstrations await!

πŸ‘‰ See it live on LinkedIn!
https://www.linkedin.com/events/7191004213999542272/
πŸ‘2πŸ‘Ύ2πŸ‘1
CVE-2024-26304, -26305, -33511, -33512 and other: Multiple vulnerabilities in ArubaOS, 5.3 - 9.8 rating πŸ”₯πŸ”₯πŸ”₯

More recently disclosed vulnerabilities allow an unauthenticated attacker to perform RCE via a buffer overflow and cause a denial of service.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/myG4Y
πŸ‘‰πŸ» Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt
πŸ”₯4πŸ‘Ύ4
CVE-2023-49606: RCE in Tinyproxy 1.10.0, 1.11.1, 9.8 rating πŸ”₯

A use-after-free vulnerability in Tinyproxy allows an attacker to perform RCE via a specially crafted HTTP header.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/vWqHD
πŸ‘‰ Dork: http.headers.server:"tinyproxy/1.11.1" OR http.headers.server:"tinyproxy/1.10.0"

Read more: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889
πŸ‘5πŸ‘Ύ3πŸ”₯1
CVE-2024-26026, -21793: Two injections in F5 Big IP, 7.5 rating❗️

SQL injection and OData injection allow an unauthenticated attacker to conduct a remote attack and gain access to sensitive information.

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/ptJHt
πŸ‘‰πŸ» Dork: http.headers.server:"BigIP"
You can also use the "f5_bigip" tag to get more results.

Read more: https://www.tenable.com/blog/cve-2024-21793-cve-2024-26026-proof-of-concept-available-for-f5-big-ip-next-central-manager
πŸ‘Ύ5πŸ”₯3πŸ‘2
CVE-2024-29895, -25641, -31445, -31459: Multiple vulns in Cacti, 8.8 - 10.0 rating πŸ”₯πŸ”₯πŸ”₯

Four new vulnerabilities in Cacti, including SQL injection, RCE, arbitrary file write. So, why are CVEs always so diverse for this product? 🧐

Search at Netlas.io:
πŸ‘‰πŸ» Link: https://nt.ls/dxZnI
πŸ‘‰πŸ» Dork: http.title:"Login to Cacti" OR http.headers.set_cookie:"Cacti"

Read more: https://thehackernews.com/2024/05/critical-flaws-in-cacti-framework-could.html
πŸ‘Ύ4πŸ‘3πŸ”₯3
πŸš€ Netlas Python SDK v.0.5 is now available. We've made key updates for enhanced compatibility and improved downolading features.

πŸ”§ To upgrade, run:

pip install --upgrade netlas


πŸ“ˆ Check out the full changelog for more details: https://docs.netlas.io/changelog/
πŸ‘Ύ5πŸ‘3❀1πŸ”₯1
πŸ”₯ Netlas 0.24.0 update is here! πŸ”₯

The update brought new information to Netlas' IP/Domain info tool - Reputation Score. Thanks to our collaboration with RST Cloud, information about the Indicators of Compromise of some hosts has become available to users right inside the web application!

Minor features:
πŸ› Fixed one favicon search bug,
πŸ“‘ Update for Datastore API endpoint,
πŸ–₯ Some improvements in UI,
and others.

πŸ‘‰πŸ» Try it now: https://app.netlas.io/host/
πŸ‘‰πŸ» Read more: https://nt.ls/iocs
πŸ”₯4πŸ‘Ύ4πŸŽ‰2πŸ‘1
CVE-2024-4835, -2874 and other: Multiple vulns in GitLab, 4.3 - 8.0 rating❗️

New set of vulnerabilities for GitLab for every taste. Account takeover, CSRF, DoS, and more.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/xmir8
πŸ‘‰ Dork: http.meta:"Gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2024/05/22/patch-release-gitlab-17-0-1-released/
πŸ‘Ύ5πŸ‘2πŸ”₯2
Create a company technological profile in one click πŸ”₯

In a new article on our Medium we will tell you how to complete your company research using Netlas.io.
This time we will find the services used, information about providers and much more πŸ”

πŸ‘‰πŸ» Read now: https://blog.netlas.io/building-tech-profile-of-a-company-f2145dedad31
πŸ”₯5πŸ‘Ύ3πŸ‘Œ1
CVE-2024-24919: Exposure of Sensitive Information in Check Point πŸ”₯

A vulnerability that has been on everyone's lips in recent days. Allows an unauthenticated attacker to gain access to sensitive information.

Search at Netlas.io:
πŸ‘‰ Link (tag, more results): https://nt.ls/z9fQV
πŸ‘‰ Dork (tag, more results): tag.name:"checkpoint"

πŸ‘‰ Link (no tag): https://nt.ls/tnMCW
πŸ‘‰ Dork (no tag): http.favicon.hash_sha256:9a3a865d8911afcd95389ec701e5e8abcad69d928efd5b52b5d0bcc70a60d11a

Vendor's advisory: https://support.checkpoint.com/results/sk/sk182336
πŸ‘Ύ6πŸ”₯3πŸ‘2
Netlas.io and RST Cloud collaboration 🀝

We trust you've observed the inclusion of threat intelligence data in the Netlas search with the release of version 0.24.0. This advancement was made achievable through our partnership with RST Cloud.
Today, we are pleased to unveil an official press release for those inclined to acquaint themselves with the full array of collaborative features.

πŸ‘‰πŸ» Press release: https://www.linkedin.com/posts/netlas-io_netlas-and-rst-cloud-forge-alliance-to-enhance-activity-7204777141576581120-E1H3/
πŸ‘Ύ5πŸ‘3πŸ”₯3❀1
CVE-2024-34102 and others: Multiple vulns in Magento Open Source, 4.8 - 9.8 rating πŸ”₯πŸ”₯πŸ”₯

New vulnerabilities in Magento (and Adobe Commerce) for every taste: arbitrary code execution, security feature bypass and privilege escalation!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/rxUR7
πŸ‘‰ Dork: tag.name:"magento"

Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb24-40.html
πŸ”₯5πŸ‘Ύ4πŸ‘3
CVE-2024-37079, -37080, -37081: Multiple vulns in VMware vSphere and vCenter, 7.8 - 9.8 rating πŸ”₯πŸ”₯πŸ”₯

RCE via heap overflow and local privilege escalation in several VMware products.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/hgQQd
πŸ‘‰ Dork: http.title:"ID_VC_Welcome" OR certificate.issuer.domain_component:"vsphere"

Vendor's advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
πŸ‘Ύ5πŸ”₯4πŸ‘2