CVE-2023-3460: Privilege Escalation in UltimateMember WordPress plugin, 9.8 rating! π₯
A vulnerability has been observed for several versions of the plugin and is actively exploited by hackers.
Search at Netlas.io:
ππ» Link: https://nt.ls/S9Skz
ππ» Dork: http.body:"wp-content/plugins/ultimate-member"
Vendor's comments: https://wordpress.org/support/topic/cve-2023-3460/
A vulnerability has been observed for several versions of the plugin and is actively exploited by hackers.
Search at Netlas.io:
ππ» Link: https://nt.ls/S9Skz
ππ» Dork: http.body:"wp-content/plugins/ultimate-member"
Vendor's comments: https://wordpress.org/support/topic/cve-2023-3460/
πΎ4π₯1
This media is not supported in your browser
VIEW IN TELEGRAM
The end of Beta Presale II is very close!
Hurry up to get Netlas.io subscription with a 50% discount, after 6 days the discount will be reduced βοΈ
ππ» Buy a subscription: https://app.netlas.io/plans/
In the near future, we'll also publish new features of Netlas.io (like in GIF). Sure you'll like them!
Hurry up to get Netlas.io subscription with a 50% discount, after 6 days the discount will be reduced βοΈ
ππ» Buy a subscription: https://app.netlas.io/plans/
In the near future, we'll also publish new features of Netlas.io (like in GIF). Sure you'll like them!
πΎ4π¨βπ»1
Media is too big
VIEW IN TELEGRAM
A new tool in Netlas π₯
The search engine has received a new functionality - the Attack Surface Discovery tool. Check out Netlas.io to build your surfaces with our data!
Links:
ππ» Tool: https://app.netlas.io/asd/
ππ» Medium article: https://netlas.medium.com/netlas-io-attack-surface-discovery-tool-6fbd6b3e9706
ππ» Overview video: https://youtu.be/98s-Iu5MyRw
The search engine has received a new functionality - the Attack Surface Discovery tool. Check out Netlas.io to build your surfaces with our data!
Links:
ππ» Tool: https://app.netlas.io/asd/
ππ» Medium article: https://netlas.medium.com/netlas-io-attack-surface-discovery-tool-6fbd6b3e9706
ππ» Overview video: https://youtu.be/98s-Iu5MyRw
π₯5π2πΎ2
CVE-2023-34192: Reflected XSS in Zimbra Collaboration Suite, 9.0 rating! π₯
The vulnerability is actively exploited by hackers.
Search at Netlas.io:
ππ» Link: https://nt.ls/ufPn6
ππ» Dork: http.favicon.hash_sha256:1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637
Read more: https://www.bleepingcomputer.com/news/security/zimbra-urges-admins-to-manually-fix-zero-day-exploited-in-attacks/
The vulnerability is actively exploited by hackers.
Search at Netlas.io:
ππ» Link: https://nt.ls/ufPn6
ππ» Dork: http.favicon.hash_sha256:1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637
Read more: https://www.bleepingcomputer.com/news/security/zimbra-urges-admins-to-manually-fix-zero-day-exploited-in-attacks/
π3πΎ3β‘1π₯1
CVE-2023-3519, -3466, -3467: Multiple vulns in Citrix Gateway/ADC, 9.8 rating π₯
Reflected XSS, privelege escalation, and unauth RCE which already exploiting!
Search at Netlas.io:
ππ» Link: https://nt.ls/HB0b1
ππ» Dork: http.title:"Citrix ADC" OR http.title:"Citrix Gateway"
Vendor's bulletin: https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
Reflected XSS, privelege escalation, and unauth RCE which already exploiting!
Search at Netlas.io:
ππ» Link: https://nt.ls/HB0b1
ππ» Dork: http.title:"Citrix ADC" OR http.title:"Citrix Gateway"
Vendor's bulletin: https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
π₯2πΎ2
Share an attack surface graph
Did you notice share button appeared in Netlas.io Attack Surface Discovery tool? Here is OKX.com attack surface as they published on Hacker0x01 for example:
https://nt.ls/63dRu
https://hackerone.com/okx
Did you notice share button appeared in Netlas.io Attack Surface Discovery tool? Here is OKX.com attack surface as they published on Hacker0x01 for example:
https://nt.ls/63dRu
https://hackerone.com/okx
πΎ5π3
CVE-2023-35078: Ivanti EPMM Remote Unauthenticated API Access Vulnerability
π¨ PoC is already available for Ivanti Endpoint Manager Mobile API vuln CVE-2023-35078 (βοΈCVSS 10.0βοΈ)
A limited number of customers have been impacted already π
Search at Netlas.io:
ππ» Link: https://nt.ls/QdWH7
ππ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendorβs advisory: https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability
π¨ PoC is already available for Ivanti Endpoint Manager Mobile API vuln CVE-2023-35078 (βοΈCVSS 10.0βοΈ)
A limited number of customers have been impacted already π
Search at Netlas.io:
ππ» Link: https://nt.ls/QdWH7
ππ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendorβs advisory: https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability
πΎ3π₯2
βπ» Another one for the same product published today: CVE-2023-35082, CVSS 10.0
A second vulnerability affecting Ivanti EPMM (formerly MobileIron Core) API has been discovered today.
Search at Netlas.io:
ππ» Link: https://nt.ls/QdWH7
ππ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendorβs advisory: https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
A second vulnerability affecting Ivanti EPMM (formerly MobileIron Core) API has been discovered today.
Search at Netlas.io:
ππ» Link: https://nt.ls/QdWH7
ππ» Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")
Vendorβs advisory: https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
πΎ3π₯2π€1
CVE-2023-39143: RCE in PaperCut MF/NG, 8.4 rating π₯
Vuln enables unauthenticated attackers to potentially work with arbitrary files to the PaperCut MF/NG application server (< 21.2.3 version), resulting in RCE in certain configurations.
Search at Netlas.io:
ππ» Link: https://nt.ls/ZGjrR
ππ» Dork: (http.title:"PaperCut Login" AND (http.description:"PaperCut NG" OR http.description:"PaperCut MF")) OR (http.favicon.perceptual_hash:3e7e66667e7c6000)
Vendor's advisory: https://www.papercut.com/kb/Main/securitybulletinjuly2023/
Vuln enables unauthenticated attackers to potentially work with arbitrary files to the PaperCut MF/NG application server (< 21.2.3 version), resulting in RCE in certain configurations.
Search at Netlas.io:
ππ» Link: https://nt.ls/ZGjrR
ππ» Dork: (http.title:"PaperCut Login" AND (http.description:"PaperCut NG" OR http.description:"PaperCut MF")) OR (http.favicon.perceptual_hash:3e7e66667e7c6000)
Vendor's advisory: https://www.papercut.com/kb/Main/securitybulletinjuly2023/
πΎ3π₯2β€1π1
CVE-2023-38035: Auth Bypass in Ivanti (MobileIron) Sentry, 9.8 rating π₯
The vulnerability allows unauthenticated attackers to access sensitive APIs on port 8443.
Search at Netlas.io:
π Link: https://nt.ls/CwTWz
π Dork: http.body:"images/sentry-mi-logo" AND port:8443
Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US
The vulnerability allows unauthenticated attackers to access sensitive APIs on port 8443.
Search at Netlas.io:
π Link: https://nt.ls/CwTWz
π Dork: http.body:"images/sentry-mi-logo" AND port:8443
Vendor's advisory: https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US
π₯2πΎ2π1π1
CVE-2023-40176, -40177, -40572, -40573: Multiple vuln in XWiki, 9.0-9.9 rating π₯
Fresh RCE, Privelege Escalation and stored XSS in XWiki Platform.
Search at Netlas.io:
π Link: https://nt.ls/SSzCU
π Dork: http.title:"XWiki" OR http.favicon.hash_sha256:6f0fdef9a229150fbc7183a1bbb136d7b44b6df7c34369c14bebb6adae8aaf20
Fresh RCE, Privelege Escalation and stored XSS in XWiki Platform.
Search at Netlas.io:
π Link: https://nt.ls/SSzCU
π Dork: http.title:"XWiki" OR http.favicon.hash_sha256:6f0fdef9a229150fbc7183a1bbb136d7b44b6df7c34369c14bebb6adae8aaf20
πΎ3π2β€1
CVE-2023-4596: RCE in Forminator plugin for WordPress, 9.8 rating π₯
The Forminator plugin in WP is vulnerable to arbitraty file upload for unauthenticated users, which may make RCE possible. PoC is availableβοΈ
Search at Netlas.io:
ππ» Link: https://nt.ls/3Tgzc
ππ» Dork: http.body:"/wp-content/plugins/forminator"
PoC is here: https://github.com/E1A/CVE-2023-4596
The Forminator plugin in WP is vulnerable to arbitraty file upload for unauthenticated users, which may make RCE possible. PoC is availableβοΈ
Search at Netlas.io:
ππ» Link: https://nt.ls/3Tgzc
ππ» Dork: http.body:"/wp-content/plugins/forminator"
PoC is here: https://github.com/E1A/CVE-2023-4596
π₯3πΎ3π1
CVE-2023-39361, -31132, -39359 and other: Multiple vuln (17 CVE's!) in Cacti, from 3.5 to 9.8 rating π₯
Stored XSS, SQL injection, RCE, Privilege Escalation... Vulnerabilities for every taste!
Search at Netlas.io:
ππ» Link: https://nt.ls/tTozX
ππ» Dork: http.title:"Login to Cacti"
Read more: https://github.com/Cacti/cacti/security
Stored XSS, SQL injection, RCE, Privilege Escalation... Vulnerabilities for every taste!
Search at Netlas.io:
ππ» Link: https://nt.ls/tTozX
ππ» Dork: http.title:"Login to Cacti"
Read more: https://github.com/Cacti/cacti/security
πΎ4π€―1
CVE-2023-36764: Elevation of Privilege in Microsoft SharePoint Server, 8.8 rating π₯
Attacker could gain administrator privileges by creating an ASP.NET page with specially-crafted declarative markup. Only authorization at the Site Member level is required.
Search at Netlas.io:
ππ» Link: https://nt.ls/BBPrT
ππ» Dork: http.headers.microsoftsharepointteamservices:*
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764
Attacker could gain administrator privileges by creating an ASP.NET page with specially-crafted declarative markup. Only authorization at the Site Member level is required.
Search at Netlas.io:
ππ» Link: https://nt.ls/BBPrT
ππ» Dork: http.headers.microsoftsharepointteamservices:*
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764
π₯2πΎ2π1
After a long break, we are finally posting a new article π₯
This time we'll not talk about third-party tools, but specifically about Netlas.io. More precisely, about searching for live cameras using our tool πΉ
π Article: https://netlas.medium.com/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
Enjoy reading!
This time we'll not talk about third-party tools, but specifically about Netlas.io. More precisely, about searching for live cameras using our tool πΉ
π Article: https://netlas.medium.com/how-to-find-online-cameras-with-netlas-io-c68cdf5f327f
Enjoy reading!
Medium
How to find online cameras with Netlas.io?
There are millions of live cameras in the world. How to find them with Netlas.io?
πΎ9π2β€1π₯1
CVE-2023-38204: Arbitrary code execution in Adobe ColdFusion, 9.8 rating π₯
Another vulnerability in ColdFusion. This time the reason was the vulnerability of some versions to Deserialization of Untrusted Data.
Search at Netlas.io:
ππ» Link: https://nt.ls/adbcf
ππ» Dork: tag.name:"adobe_coldfusion"
Vendor's advisory: https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html
Another vulnerability in ColdFusion. This time the reason was the vulnerability of some versions to Deserialization of Untrusted Data.
Search at Netlas.io:
ππ» Link: https://nt.ls/adbcf
ππ» Dork: tag.name:"adobe_coldfusion"
Vendor's advisory: https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html
πΎ7π1
If you use Google Chrome as your main browser, we have great news for you π₯
Today we officially publish Netlas.io in browser extension format! Now users can explore the site they are on at any time with a couple of clicks. Find out potential vulnerabilities, host data, and much more.
ππ» Read more: https://netlas.medium.com/netlas-io-chrome-extension-65a8e3d03bc0?postPublishedType=initial
ππ» Extension: https://chrome.google.com/webstore/detail/netlasio/pncoieihjcmpooceknjajojehmhdedii?utm_source=ext_app_menu
Today we officially publish Netlas.io in browser extension format! Now users can explore the site they are on at any time with a couple of clicks. Find out potential vulnerabilities, host data, and much more.
ππ» Read more: https://netlas.medium.com/netlas-io-chrome-extension-65a8e3d03bc0?postPublishedType=initial
ππ» Extension: https://chrome.google.com/webstore/detail/netlasio/pncoieihjcmpooceknjajojehmhdedii?utm_source=ext_app_menu
Medium
Netlas.io Chrome extension
Extensions for Google Chrome are a very popular way to extend the functionality of the browser. Now Netlas has it too!
πΎ6β€2
CVE-2023-29183: XSS in Fortinet/FortiProxy, 8.0 rating π₯
Some versions of Fortigate Fortinet and FortiProxy is vulnerable to an improper neutralization of input during web page generation, which allows an attacker to trigger malicious JavaScript code.
Search at Netlas.io:
ππ» Link: https://nt.ls/he40Q
ππ» Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f
Vendor's advisory: https://www.fortiguard.com/psirt/FG-IR-23-106
Some versions of Fortigate Fortinet and FortiProxy is vulnerable to an improper neutralization of input during web page generation, which allows an attacker to trigger malicious JavaScript code.
Search at Netlas.io:
ππ» Link: https://nt.ls/he40Q
ππ» Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f
Vendor's advisory: https://www.fortiguard.com/psirt/FG-IR-23-106
πΎ4π1
We noticed that you were very interested in the article about live cameras. That's why its sequel is coming out π₯
Today we will touch on searching for cameras using Google Dorks, and will also talk about several special sites on which anyone can post their broadcast.
ππ» Article: https://netlas.medium.com/how-to-find-online-cameras-with-google-29582e8372e0
Enjoy reading!
Today we will touch on searching for cameras using Google Dorks, and will also talk about several special sites on which anyone can post their broadcast.
ππ» Article: https://netlas.medium.com/how-to-find-online-cameras-with-google-29582e8372e0
Enjoy reading!
Medium
How to find online cameras with Google?
There are millions of live cameras in the world. How to find them with Google?
πΎ4π2π2
CVE-2023-42793: auth bypass RCE in JetBrains TeamCity, 9.8 rating π₯
An authentication bypass vulnerability has been detected in TeamCity versions < 2023.05.04, which can lead to remote code execution.
Search at Netlas.io:
ππ» Link: https://nt.ls/UM6CB
ππ» Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.05.4"
Vendor's advisory: https://www.jetbrains.com/privacy-security/issues-fixed/
An authentication bypass vulnerability has been detected in TeamCity versions < 2023.05.04, which can lead to remote code execution.
Search at Netlas.io:
ππ» Link: https://nt.ls/UM6CB
ππ» Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.05.4"
Vendor's advisory: https://www.jetbrains.com/privacy-security/issues-fixed/
πΎ3π1