CVE-2024-6387 (and probably CVE-2006-5051): Unauthenticated RCE in OpenSSH 🔥
The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.
Versions 8.5p1 to 9.8p1 are affected, and versions <4.4p are also potentially vulnerable.
Search at Netlas.io:
👉🏻 Link: https://nt.ls/ySN3C
👉🏻 Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)
Read more: https://www.qualys.com/regresshion-cve-2024-6387/
The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.
Versions 8.5p1 to 9.8p1 are affected, and versions <4.4p are also potentially vulnerable.
Search at Netlas.io:
👉🏻 Link: https://nt.ls/ySN3C
👉🏻 Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)
Read more: https://www.qualys.com/regresshion-cve-2024-6387/
👍5
Brut Security pinned «⚠️ Join Our Discussion Group ⚠️ 🔥 https://news.1rj.ru/str/brutsec 🔥 »
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3❤1
Please open Telegram to view this post
VIEW IN TELEGRAM
👏3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6❤🔥1🔥1👏1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
✅PoC: https://github.com/bigb0x/CVE-2024-36991
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
🛠️Guide to Active Directory Hacking
📝Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.
📰 Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/
🔖#infosec #cybersecurity #hacking #pentesting #security
📝Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.
📰 Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/
🔖#infosec #cybersecurity #hacking #pentesting #security
CVE-2024-39929: Bypass of attachment verification in Exim❗
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
👉 Link: https://nt.ls/gRdtH
👉 Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.
Search at Netlas.io:
👉 Link: https://nt.ls/gRdtH
👉 Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"
Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4