π Software Supply Chain Attacks β how trust breaks, and how to fix it
Modern apps lean on open-source packages, registries, clouds, and CI/CD. When any upstream link is compromised, clean projects ship trojanized code β as in the CCleaner incident. This explainer maps where trust fails and what to harden.
Whatβs inside:
1οΈβ£ The chain itself: repos, dependency managers, CI/CD, artifact storage β and the weak assumptions they rely on.
2οΈβ£ How attacks land: stolen maintainer accounts, poisoned updates, abused credentials, and automated pulls.
3οΈβ£ Case in point: a signed build gone rogue (CCleaner) shows why βofficialβ isnβt always safe.
4οΈβ£ Mitigations that matter: SBOMs, provenance and signed builds to verify what you ship and where it came from.
π Full article here: https://netlas.io/blog/supply_chain_attack/
Modern apps lean on open-source packages, registries, clouds, and CI/CD. When any upstream link is compromised, clean projects ship trojanized code β as in the CCleaner incident. This explainer maps where trust fails and what to harden.
Whatβs inside:
1οΈβ£ The chain itself: repos, dependency managers, CI/CD, artifact storage β and the weak assumptions they rely on.
2οΈβ£ How attacks land: stolen maintainer accounts, poisoned updates, abused credentials, and automated pulls.
3οΈβ£ Case in point: a signed build gone rogue (CCleaner) shows why βofficialβ isnβt always safe.
4οΈβ£ Mitigations that matter: SBOMs, provenance and signed builds to verify what you ship and where it came from.
π Full article here: https://netlas.io/blog/supply_chain_attack/
netlas.io
Supply Chain Attack - How Attackers Weaponize Software Supply Chains - Netlas Blog
Explains how software supply chain attacks subvert trust in open source, CI/CD and registries, and how SBOM, provenance and signed builds mitigate risk.
1πΎ4β€3π1
π Bug Bounty 101 β a complete 2026 roadmap for beginners
Netlasβ new guide cuts through the βdead vs $100kβ hype: bug bounty isnβt dead, itβs just more mature. Success now comes from smart target selection, solid recon, manual testing, and reports that get accepted.
Whatβs inside:
1οΈβ£ Prerequisites checklist: networking, HTTP basics, light coding, core vulns, and why patience/focus matter.
2οΈβ£ Picking targets: start with VDPs and less-crowded programs; use HackerOne/Bugcrowd/Intigriti and Google dorks to find scopes; stick to one target.
3οΈβ£ Recon that works: org WHOIS β asset mapping β subdomains; customize your flow, with a concrete Netlas example and CLI tips.
4οΈβ£ Hunting methodology: build product knowledge first; use a single multi-signal test string to probe inputs; avoid blind payload spam.
5οΈβ£ Reports that get paid and beginner mistakes to avoid, plus a practical 60-day plan to your first live finding.
π Read here: https://netlas.io/blog/bug_bounty_roadmap/
Netlasβ new guide cuts through the βdead vs $100kβ hype: bug bounty isnβt dead, itβs just more mature. Success now comes from smart target selection, solid recon, manual testing, and reports that get accepted.
Whatβs inside:
1οΈβ£ Prerequisites checklist: networking, HTTP basics, light coding, core vulns, and why patience/focus matter.
2οΈβ£ Picking targets: start with VDPs and less-crowded programs; use HackerOne/Bugcrowd/Intigriti and Google dorks to find scopes; stick to one target.
3οΈβ£ Recon that works: org WHOIS β asset mapping β subdomains; customize your flow, with a concrete Netlas example and CLI tips.
4οΈβ£ Hunting methodology: build product knowledge first; use a single multi-signal test string to probe inputs; avoid blind payload spam.
5οΈβ£ Reports that get paid and beginner mistakes to avoid, plus a practical 60-day plan to your first live finding.
π Read here: https://netlas.io/blog/bug_bounty_roadmap/
netlas.io
Bug Bounty 101 - A Complete Bug Bounty Roadmap for Beginners (2026) - Netlas Blog
Practical 2026 bug bounty roadmap for beginners: choosing targets, recon, web/API bugs, manual testing and writing reports that get paid
1π₯3πΎ3π1
CVE-2025-37165, -37166: Multiple vulnerabilities in Aruba, 7.5 ratingβοΈ
Vulnerabilities in Aruba HPE allow an attacker to perform a DoS or gain knowledge of the internal network configuration.
Search at Netlas.io:
π Link: https://nt.ls/AlIHR
π Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753
Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&docLocale=en_US#hpesbnw04988-rev-1-hpe-networking-instant-on-multi-0
Vulnerabilities in Aruba HPE allow an attacker to perform a DoS or gain knowledge of the internal network configuration.
Search at Netlas.io:
π Link: https://nt.ls/AlIHR
π Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753
Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&docLocale=en_US#hpesbnw04988-rev-1-hpe-networking-instant-on-multi-0
1πΎ3π₯1
CVE-2025-13927, -13928, -13335, CVE-2026-0723, -1102: Multiple vulnerabilitites in GitLab, 3.1 - 7.5 ratingβοΈ
Several recent vulnerabilities in GitLab include DoS, Incorrect Authorization, and other issues.
Search at Netlas.io:
π Link: https://nt.ls/5JrG3
π Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"
Vendor's advisory: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
Several recent vulnerabilities in GitLab include DoS, Incorrect Authorization, and other issues.
Search at Netlas.io:
π Link: https://nt.ls/5JrG3
π Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"
Vendor's advisory: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
πΎ3
CVE-2025-59718, -59719: Improper Verification of Cryptographic Signature in Fortinet devices, 9.8 rating π₯
Fortinet researchers have discovered instances of exploitation of last year's vulnerabilities that bypassed patches. We recommend reviewing the mitigation recommendations.
Search at Netlas.io:
π Link: https://nt.ls/X38VT
π Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f
Vendor's advisory: https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios
Fortinet researchers have discovered instances of exploitation of last year's vulnerabilities that bypassed patches. We recommend reviewing the mitigation recommendations.
Search at Netlas.io:
π Link: https://nt.ls/X38VT
π Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f
Vendor's advisory: https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios
1π₯3πΎ3
Top 10 Critical Threat Actors - who they are, how they operate, how to respond π
Netlas distills the ten most consequential adversaries shaping 2026 risk. For each actor you get a clean snapshot: motives, preferred targets, initial-access methods, tooling/C2 habits, notable intrusions, and concrete detections/mitigations.
Whatβs inside:
β Clear selection criteria (impact, capability, tempo, cross-sector reach) for each actor.
π οΈ Playbook patterns youβll actually see: phishing & social engineering, supply-chain/third-party abuse, cloud & SaaS compromise, data theft and extortion.
π Infrastructure habits: rotating domains/hosts, abuse of legitimate services, and operational security tells defenders can hunt for.
ποΈ Sector focus: government, finance, telco, healthcare, manufacturing, and critical infrastructure - with risk notes per vertical.
πCopy-paste defenses: phishing-resistant MFA, hardening endpoints and SaaS, egress/DNS controls, backup immutability, logging that supports fast IR, and tabletop exercises mapped to these actors.
A practical brief for CISOs, IR leads, and engineering managers planning 2026 controls.
π Read now: https://netlas.io/blog/top_10_critical_threat_actors/
Netlas distills the ten most consequential adversaries shaping 2026 risk. For each actor you get a clean snapshot: motives, preferred targets, initial-access methods, tooling/C2 habits, notable intrusions, and concrete detections/mitigations.
Whatβs inside:
β Clear selection criteria (impact, capability, tempo, cross-sector reach) for each actor.
π οΈ Playbook patterns youβll actually see: phishing & social engineering, supply-chain/third-party abuse, cloud & SaaS compromise, data theft and extortion.
π Infrastructure habits: rotating domains/hosts, abuse of legitimate services, and operational security tells defenders can hunt for.
ποΈ Sector focus: government, finance, telco, healthcare, manufacturing, and critical infrastructure - with risk notes per vertical.
πCopy-paste defenses: phishing-resistant MFA, hardening endpoints and SaaS, egress/DNS controls, backup immutability, logging that supports fast IR, and tabletop exercises mapped to these actors.
A practical brief for CISOs, IR leads, and engineering managers planning 2026 controls.
π Read now: https://netlas.io/blog/top_10_critical_threat_actors/
netlas.io
Top 10 Critical Threat Actors to Watch in 2026: Ransomware, APTs & Defensive Strategies - Netlas Blog
2026 threat landscape: 10 top ransomware, APT and extortion groups. TTPs, resilience after takedowns, and defenses: patching, identity, backups, detection.
π₯6β€2π1
π Inside ClickFix: how fake prompts took over the web
Fake CAPTCHAs and βverificationβ pages coax users into pasting system commands via trusted tools like Run or PowerShell. No exploit, no download β the victim executes the payload themselves, sidestepping many defenses.
Whatβs inside
1οΈβ£ The evolution: from simple error popups to polished reCAPTCHA/Turnstile clones, OS-aware pages, and video walk-throughs that raise urgency.
2οΈβ£ Scale of the problem: ESET tracked a 517% rise (H2β24βH1β25); ClickFix-style lures now account for ~8% of blocked attacks.
3οΈβ£ APT adoption: ClearFake, TA571, Lazarus, Kimsuky, Callisto/Sednit, MuddyWater, APT36 β cross-platform, high-impact use.
4οΈβ£ Anatomy of an attack: delivery β deceptive prompt β clipboard injection β user-initiated execution β payload retrieval.
5οΈβ£ Real-world sample: a faux CAPTCHA plants a VBS downloader command, then runs the fetched script from %TEMP%.
6οΈβ£ Why it lands: Microsoftβs 2025 report calls ClickFix the top initial-access vector, tied to 47% of recorded intrusions.
Bonus: the article includes hunting tips and how to stop these chains at scale. ππ‘οΈ
π Read here: https://netlas.io/blog/fake_prompts/
Fake CAPTCHAs and βverificationβ pages coax users into pasting system commands via trusted tools like Run or PowerShell. No exploit, no download β the victim executes the payload themselves, sidestepping many defenses.
Whatβs inside
1οΈβ£ The evolution: from simple error popups to polished reCAPTCHA/Turnstile clones, OS-aware pages, and video walk-throughs that raise urgency.
2οΈβ£ Scale of the problem: ESET tracked a 517% rise (H2β24βH1β25); ClickFix-style lures now account for ~8% of blocked attacks.
3οΈβ£ APT adoption: ClearFake, TA571, Lazarus, Kimsuky, Callisto/Sednit, MuddyWater, APT36 β cross-platform, high-impact use.
4οΈβ£ Anatomy of an attack: delivery β deceptive prompt β clipboard injection β user-initiated execution β payload retrieval.
5οΈβ£ Real-world sample: a faux CAPTCHA plants a VBS downloader command, then runs the fetched script from %TEMP%.
6οΈβ£ Why it lands: Microsoftβs 2025 report calls ClickFix the top initial-access vector, tied to 47% of recorded intrusions.
Bonus: the article includes hunting tips and how to stop these chains at scale. ππ‘οΈ
π Read here: https://netlas.io/blog/fake_prompts/
netlas.io
Inside ClickFix: How Fake Prompts Took Over the Web - Netlas Blog
ClickFix turns fake CAPTCHAs into user-executed malware chains. Learn how campaigns evolve, how to hunt them at scale with Netlas, and how to stop them
π₯5πΎ3β€2π2
CVE-2026-1281, -1340: Two vulnerabilities in Ivanti EPMM, 9.8 rating π₯
Two recent vulnerabilities in Ivanti EPMM allow attackers to perform RCE. Cases have already been reported in the wild!
Search at Netlas.io:
π Link: https://nt.ls/EbWv1
π Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
Two recent vulnerabilities in Ivanti EPMM allow attackers to perform RCE. Cases have already been reported in the wild!
Search at Netlas.io:
π Link: https://nt.ls/EbWv1
π Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
πΎ5π3π₯3β€1
CVE-2026-1207, -1285, -1287 and other: Multiple vulnerabilities in Django Framework, 5.3 - 7.5 ratingβοΈ
Several vulnerabilities in Django allow attackers to perform SQL injection and DoS attacks.
Search at Netlas.io:
π Link: https://nt.ls/SOxq1
π Dork: tag.name:"django"
Vendor's advisory: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
Several vulnerabilities in Django allow attackers to perform SQL injection and DoS attacks.
Search at Netlas.io:
π Link: https://nt.ls/SOxq1
π Dork: tag.name:"django"
Vendor's advisory: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
π₯5π3πΎ2
π Top 10 Hacking Devices for Ethical Hackers in 2026
Here is a practical guide to the hardware pentesting toolkit that keeps showing up in real engagements: what each device does, what itβs good for, and where the legal/ethical lines are.
What youβll get from the list:
1οΈβ£ Flipper Zero π¬: a pocket multi-tool for Sub-GHz, RFID/NFC, IR and more, plus real-world examples of signal abuse.
2οΈβ£ USB Rubber Ducky π¦: HID βkeyboardβ injection that turns physical access into instant scripted actions.
3οΈβ£ Wi-Fi / wireless pentest gear π‘: purpose-built tools for testing how networks handle rogue access points and user behavior.
4οΈβ£ RFID/NFC specialists π«: devices like Proxmark3 for assessing badge systems and weak access control tech.
5οΈβ£ SDR hardware π»: HackRF and friends for exploring radio-based attack surfaces beyond βnormalβ Wi-Fi/Bluetooth.
6οΈβ£ Clear boundaries βοΈ: whatβs generally legal to own vs. what becomes illegal fast without written permission and scope.
If youβre building a red-team kit (or defending against these exact techniques), this oneβs a solid bookmark. ππ‘οΈ
π Read here: https://netlas.io/blog/top_10_hacking_devices_2026/
Here is a practical guide to the hardware pentesting toolkit that keeps showing up in real engagements: what each device does, what itβs good for, and where the legal/ethical lines are.
What youβll get from the list:
1οΈβ£ Flipper Zero π¬: a pocket multi-tool for Sub-GHz, RFID/NFC, IR and more, plus real-world examples of signal abuse.
2οΈβ£ USB Rubber Ducky π¦: HID βkeyboardβ injection that turns physical access into instant scripted actions.
3οΈβ£ Wi-Fi / wireless pentest gear π‘: purpose-built tools for testing how networks handle rogue access points and user behavior.
4οΈβ£ RFID/NFC specialists π«: devices like Proxmark3 for assessing badge systems and weak access control tech.
5οΈβ£ SDR hardware π»: HackRF and friends for exploring radio-based attack surfaces beyond βnormalβ Wi-Fi/Bluetooth.
6οΈβ£ Clear boundaries βοΈ: whatβs generally legal to own vs. what becomes illegal fast without written permission and scope.
If youβre building a red-team kit (or defending against these exact techniques), this oneβs a solid bookmark. ππ‘οΈ
π Read here: https://netlas.io/blog/top_10_hacking_devices_2026/
netlas.io
Top 10 Hacking Devices for Ethical Hackers in 2026 - Netlas Blog
Explore top hardware pentesting tools (Flipper Zero, Rubber Ducky, WiFi Pineapple, Proxmark3, HackRF) with real-world cases
1π4π₯4πΎ4β€1
CVE-2026-1490: Vulnerability in CleanTalk WordPress plugin, 9.8 rating π₯
The vulnerability allows attackers to install any plugin on an affected website, which could be the first step in any attack chain.
Search at Netlas.io:
π Link: https://nt.ls/wZ4Qu
π Dork: http.body:"plugins/cleantalk-spam-protect"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/cleantalk-spam-protect/spam-protection-honeypot-anti-spam-by-cleantalk-671-authorization-bypass-via-reverse-dns-ptr-record-spoofing-to-unauthenticated-arbitrary-plugin-installation
The vulnerability allows attackers to install any plugin on an affected website, which could be the first step in any attack chain.
Search at Netlas.io:
π Link: https://nt.ls/wZ4Qu
π Dork: http.body:"plugins/cleantalk-spam-protect"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/cleantalk-spam-protect/spam-protection-honeypot-anti-spam-by-cleantalk-671-authorization-bypass-via-reverse-dns-ptr-record-spoofing-to-unauthenticated-arbitrary-plugin-installation
1β€3π3πΎ2
Netlas v1.6 is out
π Private Scanner now supports βScan all portsβ β non-intrusive scans across 65,536 TCP ports.
π Added CWMP protocol support.
β οΈ Breaking change: updated Discovery API response format for groups.
Details at https://docs.netlas.io/changelog/
π Private Scanner now supports βScan all portsβ β non-intrusive scans across 65,536 TCP ports.
π Added CWMP protocol support.
β οΈ Breaking change: updated Discovery API response format for groups.
Details at https://docs.netlas.io/changelog/
docs.netlas.io
Changelog - Netlas Docs
Explore the latest updates, enhancements, and fixes on the Netlas platform. Stay informed with our Changelog for all product and feature developments.
1π₯5β€4π2
Netlas Legal Update
Weβve revised the Netlas Terms & Conditions and API & Data License Agreement.
The updated terms take effect on March 6, 2026.
Details: https://netlas.io/blog/terms_updated/
Weβve revised the Netlas Terms & Conditions and API & Data License Agreement.
The updated terms take effect on March 6, 2026.
Details: https://netlas.io/blog/terms_updated/
netlas.io
Netlas Updates Terms and API & Data License Agreement - Netlas Blog
Netlas has updated its Terms & Conditions and API & Data License Agreement, with the changes taking effect on March 6, 2026.
π3β€1β1π₯°1π1
π Netlas and Uncover
The article has been updated. All commands were reviewed and tested.
ππΌ Read the guide:
https://netlas.io/blog/netlas_and_uncover/
The article has been updated. All commands were reviewed and tested.
ππΌ Read the guide:
https://netlas.io/blog/netlas_and_uncover/
netlas.io
Using Uncover with Netlas.io module - Netlas Blog
Instructions for using the Netlas module integrated into Uncover from ProjectDiscovery
π5β€3π₯3
βοΈ Ever wondered how professional threat intelligence feeds are actually built?
Our partners at RST Cloud pull back the curtain on their approach to threat hunting β revealing how they identify, track, and expand command-and-control (C2) infrastructure at scale.
π Inside the post:
β’ How RST Cloud discovers malicious infrastructure in the wild
β’ Techniques for linking isolated IoCs into meaningful threat clusters
β’ The methodology behind building reliable, high-quality threat intelligence feeds
β’ How Netlas data helps enrich and accelerate investigations
This is a rare look into the real workflows behind modern threat intelligence β straight from a team doing it every day.
π 5 min read
π https://netlas.io/blog/Ρ2_hunting_by_rst_cloud/
Our partners at RST Cloud pull back the curtain on their approach to threat hunting β revealing how they identify, track, and expand command-and-control (C2) infrastructure at scale.
π Inside the post:
β’ How RST Cloud discovers malicious infrastructure in the wild
β’ Techniques for linking isolated IoCs into meaningful threat clusters
β’ The methodology behind building reliable, high-quality threat intelligence feeds
β’ How Netlas data helps enrich and accelerate investigations
This is a rare look into the real workflows behind modern threat intelligence β straight from a team doing it every day.
π 5 min read
π https://netlas.io/blog/Ρ2_hunting_by_rst_cloud/
netlas.io
How we hunt C2 infrastructure at RST Cloud using Netlas - Netlas Blog
RST Cloud's C2 hunting workflow with Netlas: use JARM, HTTP headers, certificates, and domain pivots to detect active malicious infrastructure early.
π3π₯2β€1
CVE-2026-3429, CVE-2026-4636 and others in Keycloak.
Several vulnerabilities in Keycloak allow attackers to bypass MFA, steal access tokens, and access confidential user data.
Search at Netlas.io:
π Link: https://nt.ls/Ooqi1
π Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676
Vendor's advisory: https://www.keycloak.org/2026/04/keycloak-2657-released
Several vulnerabilities in Keycloak allow attackers to bypass MFA, steal access tokens, and access confidential user data.
Search at Netlas.io:
π Link: https://nt.ls/Ooqi1
π Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676
Vendor's advisory: https://www.keycloak.org/2026/04/keycloak-2657-released
π₯5
CVE-2026-0740: Vulnerability in Ninja Forms WordPress plugin, 9.8 rating
The vulnerability allows unauthenticated attackers to upload arbitrary files to a vulnerable site and achieve remote code execution.
Search at Netlas.io:
π Link: https://nt.ls/rkM7h
π Dork: http.body:"plugins/ninja-forms"
Read more: https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/
The vulnerability allows unauthenticated attackers to upload arbitrary files to a vulnerable site and achieve remote code execution.
Search at Netlas.io:
π Link: https://nt.ls/rkM7h
π Dork: http.body:"plugins/ninja-forms"
Read more: https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/
π₯6
π How to Find Unprotected Databases β Chapter 2
A Netlas beginnerβs guide β now republished on our blog (moved from Medium). Reviewed and updated.
π 5 min read
π https://netlas.io/blog/how_to_find_unprotected_databases_chapter_2/
A Netlas beginnerβs guide β now republished on our blog (moved from Medium). Reviewed and updated.
π 5 min read
π https://netlas.io/blog/how_to_find_unprotected_databases_chapter_2/
netlas.io
How to find unprotected databases with Netlas.io: Chapter 2 - Netlas Blog
Continue to study the importance of database security using the examples of Netlas searches. This time youβll even see hacked databases!
π5β€1
CVE-2026-4112 and other: SQL injection and TOTP vulnerabilities in SonicWall SMA 1000 Series, up to 7.2 rating βοΈ
The most severe vulnerability (SQL injection) allows remote authenticated attacker with read-only administrator privileges to escalate privileges to primary administrator.
Search at Netlas.io:
π Link: https://nt.ls/mzseI
π Dork: http.favicon.hash_sha256:6bb6f64adaa6a7ed4da10a2fe4edf4cb4d9914aa742c7ad607ca4ca678dcd3f1 OR certificate.subject_dn:"HTTPS Management Certificate for SonicWALL (self-signed)"
Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0003
The most severe vulnerability (SQL injection) allows remote authenticated attacker with read-only administrator privileges to escalate privileges to primary administrator.
Search at Netlas.io:
π Link: https://nt.ls/mzseI
π Dork: http.favicon.hash_sha256:6bb6f64adaa6a7ed4da10a2fe4edf4cb4d9914aa742c7ad607ca4ca678dcd3f1 OR certificate.subject_dn:"HTTPS Management Certificate for SonicWALL (self-signed)"
Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0003
β€3π₯3
CVE-2026-5173, CVE-2026-1092, CVE-2025-12664 and other: Vulnerabilities in GitLab CE and EE, up to 8.5 rating π₯
Several vulnerabilities in GitLab could compromise code integrity and allow an unauthenticated user to cause denial of service.
Search at Netlas.io:
π Link: https://nt.ls/QGxUF
π Dork: http.title:"GitLab" OR http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef
Vendor's advisory: https://about.gitlab.com/releases/2026/04/08/patch-release-gitlab-18-10-3-released/
Several vulnerabilities in GitLab could compromise code integrity and allow an unauthenticated user to cause denial of service.
Search at Netlas.io:
π Link: https://nt.ls/QGxUF
π Dork: http.title:"GitLab" OR http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef
Vendor's advisory: https://about.gitlab.com/releases/2026/04/08/patch-release-gitlab-18-10-3-released/
β€2π₯2π1
CVE-2026-40175: Unrestricted Cloud Metadata Exfiltration in Axios, 10.0 rating π±
A critical security vulnerability in Axios allows prototype pollution in any third-party dependency to be escalated into RCE or Full Cloud Compromise. PoC is now available!
Search at Netlas.io:
π Link: https://nt.ls/i7rT8
π Dork: tag.name:"axios"
Read more:
https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx
A critical security vulnerability in Axios allows prototype pollution in any third-party dependency to be escalated into RCE or Full Cloud Compromise. PoC is now available!
Search at Netlas.io:
π Link: https://nt.ls/i7rT8
π Dork: tag.name:"axios"
Read more:
https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx
π₯5β€2