Fact: old SSL/TLS certificate threatens both the reputation of the website and the security of the data the user is working with❗
How to check the certificate for yourself or a contractor?
👉 Just use Netlas: https://app.netlas.io/certs/
How to check the certificate for yourself or a contractor?
👉 Just use Netlas: https://app.netlas.io/certs/
👾3❤1👍1
CVE-2024-27198, -27199: Auth Bypass in JetBrains TeamCity, 9.8 rating 🔥
The vulnerabilities may enable an attacker to bypass authentication checks and gain administrative permissions on the TeamCity server. Affected all versions through 2023.11.3!
Search at Netlas.io:
👉 Link: https://nt.ls/7DYva
👉 Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.11.3" NOT http.body:"2023.11.4"
Vendor's advisory: https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/
The vulnerabilities may enable an attacker to bypass authentication checks and gain administrative permissions on the TeamCity server. Affected all versions through 2023.11.3!
Search at Netlas.io:
👉 Link: https://nt.ls/7DYva
👉 Dork: http.headers.set_cookie:TCSESSIONID NOT http.body:"2023.11.3" NOT http.body:"2023.11.4"
Vendor's advisory: https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/
👾5🔥3👍2
Website update 🔥
We have changed our website a little, and now you can find much more useful materials there, including use cases, links to our resources, and updated documentation.
👉🏻 Read new docs and guides: https://docs.netlas.io/
We have changed our website a little, and now you can find much more useful materials there, including use cases, links to our resources, and updated documentation.
👉🏻 Read new docs and guides: https://docs.netlas.io/
docs.netlas.io
Netlas Docs
Insights and detailed instructions on using the Netlas.io platform and development using Netlas API and SDK.
👾4🔥2🙏1
CVE-2024-21899, -21900, -21901: Improper Authentication and other in QNAP NAS, 4.3 - 9.8 rating 🔥
Code injection, execution of arbitrary commands and, most interestingly, a vulnerability in the authentication that allows an attacker to compromise the entire system via network.
Search at Netlas.io:
👉🏻 Link: https://nt.ls/Wnycw
👉🏻 Dork: http.body_sha256:4a1815f3e87d6d623c22921d9c39b2de614351d71831976bbc807f571953ff21
Vendor's advisory: https://www.qnap.com/en/security-advisory/qsa-24-09
Code injection, execution of arbitrary commands and, most interestingly, a vulnerability in the authentication that allows an attacker to compromise the entire system via network.
Search at Netlas.io:
👉🏻 Link: https://nt.ls/Wnycw
👉🏻 Dork: http.body_sha256:4a1815f3e87d6d623c22921d9c39b2de614351d71831976bbc807f571953ff21
Vendor's advisory: https://www.qnap.com/en/security-advisory/qsa-24-09
🔥7👾2❤1🙏1
APSB24-05, APSB24-14: Multiple vulns in Adobe products, critical rating 🔥
Two vulnerabilities from the new Adobe security bulletin, the exploitation of which will allow an attacker to achieve arbitrary file system read, code execution, and security feature bypass.
Search at Netlas.io:
👉🏻 Link: https://nt.ls/EEZn7
👉🏻 Dork: tag.name:"adobe_experience_manager" OR tag.name:"adobe_coldfusion"
Vendor's advisory: https://helpx.adobe.com/security/security-bulletin.html
Two vulnerabilities from the new Adobe security bulletin, the exploitation of which will allow an attacker to achieve arbitrary file system read, code execution, and security feature bypass.
Search at Netlas.io:
👉🏻 Link: https://nt.ls/EEZn7
👉🏻 Dork: tag.name:"adobe_experience_manager" OR tag.name:"adobe_coldfusion"
Vendor's advisory: https://helpx.adobe.com/security/security-bulletin.html
👾4🔥3❤2
CVE-2024-23334: Path Traversal in aiohttp Python lib, 7.5 rating❗
An old vulnerability that has started to gain attention again recently. According to Cyble research, attackers have been scanning nodes with a vulnerable version of the library since the end of February. We recommend that everyone who uses it update immediately!
Search at Netlas.io:
👉 Link: https://nt.ls/lrzzv
👉 Dork: http.headers.server:"aiohttp"
Read more: https://www.bleepingcomputer.com/news/security/hackers-exploit-aiohttp-bug-to-find-vulnerable-networks/
An old vulnerability that has started to gain attention again recently. According to Cyble research, attackers have been scanning nodes with a vulnerable version of the library since the end of February. We recommend that everyone who uses it update immediately!
Search at Netlas.io:
👉 Link: https://nt.ls/lrzzv
👉 Dork: http.headers.server:"aiohttp"
Read more: https://www.bleepingcomputer.com/news/security/hackers-exploit-aiohttp-bug-to-find-vulnerable-networks/
👾5🔥3❤2👍2
🚧Planned update 🚧
The update will last 21.03.2024 from ~08:00 - 09:00 UTC ⏰, during which time the application will be unavailable.
Don't forget to save the results of your work before this.
The update will last 21.03.2024 from ~08:00 - 09:00 UTC ⏰, during which time the application will be unavailable.
Don't forget to save the results of your work before this.
👾3🙏2👍1🔥1
Media is too big
VIEW IN TELEGRAM
Major Attack Surface Discovery Tool update🔥
New features:
- Grouping results;
- Group searches;
- Improved color segregation;
- Hiding excluded nodes;
- History tab;
and more.
👉 Read more: https://blog.netlas.io/major-update-for-attack-surface-discovery-tool-4ed4f1bc80fb
👉 Help topic: https://docs.netlas.io/easm/
👉 Try now: https://app.netlas.io/asd/
Come quickly and test the new functionality of Netlas! ✨
New features:
- Grouping results;
- Group searches;
- Improved color segregation;
- Hiding excluded nodes;
- History tab;
and more.
👉 Read more: https://blog.netlas.io/major-update-for-attack-surface-discovery-tool-4ed4f1bc80fb
👉 Help topic: https://docs.netlas.io/easm/
👉 Try now: https://app.netlas.io/asd/
Come quickly and test the new functionality of Netlas! ✨
🔥5👾3❤1💋1
How to find industrial objects with Netlas.io? 🏭
Short cheat sheet based on one of our articles. A few filters will allow you to make sure that nearby factories are protected.
👉 Read more about industrial devices search: https://medium.com/@netlas/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
Short cheat sheet based on one of our articles. A few filters will allow you to make sure that nearby factories are protected.
👉 Read more about industrial devices search: https://medium.com/@netlas/searching-industrial-infrastructure-with-netlas-io-49c08ca519a2
🔥5👾4💋1
CVE-2024-21677: Path Traversal in Atlassian Confluence, 8.3 rating❗
The vulnerability discovered during the Bug Bounty program allows an unauthenticated attacker to carry out actions that threaten the confidentiality and availability of the system. The patch has already been released.
Search at Netlas.io:
👉 Link: https://nt.ls/mghaY
👉 Dork: http.meta:"confluence-base-url"
Vendor's bulletin: https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html
The vulnerability discovered during the Bug Bounty program allows an unauthenticated attacker to carry out actions that threaten the confidentiality and availability of the system. The patch has already been released.
Search at Netlas.io:
👉 Link: https://nt.ls/mghaY
👉 Dork: http.meta:"confluence-base-url"
Vendor's bulletin: https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html
👾5❤3🔥3👍1💋1
CVE-2024-20767: Improper Access Control in Adobe ColdFusion, 8.2 rating❗️
A new vulnerability in ColdFusion that allows an unauthenticated attacker to gain access to sensitive files. PoC is available!
Search at Netlas.io:
👉🏻 Link: https://nt.ls/jl0cW
👉🏻 Dork: tag.name:"adobe_coldfusion"
Vendor's bulletin: https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
A new vulnerability in ColdFusion that allows an unauthenticated attacker to gain access to sensitive files. PoC is available!
Search at Netlas.io:
👉🏻 Link: https://nt.ls/jl0cW
👉🏻 Dork: tag.name:"adobe_coldfusion"
Vendor's bulletin: https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
👾5❤4🔥2💋1
CVE-2024-31136 and other: Multiple vulns in JetBrains TeamCity, 4.1 - 7.4 rating❗
Seven new vulnerabilities in TeamCity: Improrer Validation, Neutralization and others. Install the patch quickly!
Search at Netlas.io:
👉 Link: https://nt.ls/HmnT2
👉 Dork: tag.name:"teamcity"
Vendor's advisories: https://www.jetbrains.com/privacy-security/issues-fixed/
Seven new vulnerabilities in TeamCity: Improrer Validation, Neutralization and others. Install the patch quickly!
Search at Netlas.io:
👉 Link: https://nt.ls/HmnT2
👉 Dork: tag.name:"teamcity"
Vendor's advisories: https://www.jetbrains.com/privacy-security/issues-fixed/
👾4👍2🔥1
CVE-2024-2879: SQL injection in LayerSlider plugin for WordPress, 9.8 rating 🔥
Plugin used on millions of websites had a feature that was vulnerable to blind SQL injection. If the vulnerability was successfully exploited, the attacker could gain access to any confidential information.
Search at Netlas.io:
👉 Link: https://nt.ls/8CmgD
👉 Dork: http.body:"plugins/layerslider"
Read more: https://www.wordfence.com/blog/2024/04/5500-bounty-awarded-for-unauthenticated-sql-injection-vulnerability-patched-in-layerslider-wordpress-plugin/
Plugin used on millions of websites had a feature that was vulnerable to blind SQL injection. If the vulnerability was successfully exploited, the attacker could gain access to any confidential information.
Search at Netlas.io:
👉 Link: https://nt.ls/8CmgD
👉 Dork: http.body:"plugins/layerslider"
Read more: https://www.wordfence.com/blog/2024/04/5500-bounty-awarded-for-unauthenticated-sql-injection-vulnerability-patched-in-layerslider-wordpress-plugin/
🔥6👾2
👾 Netlas 0.23.1 update 👾
👉 Two API endpoints added, one depricated
👉 API schema documentation updated
🐞 Super annoying autocomplete bug fixed!
❗ We also noticed that Netlas is often used through a proxy without registration. To reduce the load on the servers, the number of requests available to unregistered users has been reduced to 10 ❗
Changelog: https://nt.ls/changelog
📖 Netlas Docs update 📖
👉 To learn more about the features of Netlas Search tools, read the recently published help topic: https://nt.ls/pPte1
👉 Details and examples of usage Netlas IP/Domain tool: https://nt.ls/wDuYN
👉 Two API endpoints added, one depricated
👉 API schema documentation updated
🐞 Super annoying autocomplete bug fixed!
❗ We also noticed that Netlas is often used through a proxy without registration. To reduce the load on the servers, the number of requests available to unregistered users has been reduced to 10 ❗
Changelog: https://nt.ls/changelog
📖 Netlas Docs update 📖
👉 To learn more about the features of Netlas Search tools, read the recently published help topic: https://nt.ls/pPte1
👉 Details and examples of usage Netlas IP/Domain tool: https://nt.ls/wDuYN
👍4👾3
CVE-2024-3273: RCE in D-Link NAS, 7.3 rating 🔥
The vulnerability can be exploited due to a combination of two weaknesses: a hardcoded account and the ability to inject commands through the “system” parameter. There are many devices affected that have reached the end of their lifespan.
According to GreyNoise, hackers are already carrying out attacks! 😨
Search at Netlas.io:
👉 Link: https://nt.ls/TyD6H
👉 Dork: http.body:"Text:In order to access the ShareCenter"
Read more: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-92-000-d-link-nas-devices-now-exploited-in-attacks/
The vulnerability can be exploited due to a combination of two weaknesses: a hardcoded account and the ability to inject commands through the “system” parameter. There are many devices affected that have reached the end of their lifespan.
According to GreyNoise, hackers are already carrying out attacks! 😨
Search at Netlas.io:
👉 Link: https://nt.ls/TyD6H
👉 Dork: http.body:"Text:In order to access the ShareCenter"
Read more: https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-92-000-d-link-nas-devices-now-exploited-in-attacks/
🔥4👾3👍2
❗️Cookie consent update❗️
To improve usability and functionality of the site, as well as in connection with new requirements from Google, we are changing the mechanism for obtaining cookie consent.
After the update, consent will be consistent across all of our resources, including the website, app, and help portal.
We would be grateful if you check the box again ✅
To improve usability and functionality of the site, as well as in connection with new requirements from Google, we are changing the mechanism for obtaining cookie consent.
After the update, consent will be consistent across all of our resources, including the website, app, and help portal.
We would be grateful if you check the box again ✅
👾5🤝1
CVE-2024-3400: command injection in Palo Alto Networks PAN-OS, 10.0 rating 🔥🔥🔥
A 0-day vulnerability in PAN-OS that allows an unauthenticated attacker to execute arbitrary code on the firewall with root rights. According to Palo Alto Networks, attacks have already been carried out that exploit this vulnerability!
Search at Netlas.io:
👉 Link: https://nt.ls/eprag
👉 Dork: tag.name:"palo_alto"
Vendor's advisory: https://security.paloaltonetworks.com/CVE-2024-3400
A 0-day vulnerability in PAN-OS that allows an unauthenticated attacker to execute arbitrary code on the firewall with root rights. According to Palo Alto Networks, attacks have already been carried out that exploit this vulnerability!
Search at Netlas.io:
👉 Link: https://nt.ls/eprag
👉 Dork: tag.name:"palo_alto"
Vendor's advisory: https://security.paloaltonetworks.com/CVE-2024-3400
🔥5👾2
🔥 Netlas.io Discord server 🔥
Engage in live chat with our community on Discord!
Here you can quickly get answers to important questions, talk with other users, and read the latest news in a new convenient format.
👉 Follow the link: https://nt.ls/discord
Engage in live chat with our community on Discord!
Here you can quickly get answers to important questions, talk with other users, and read the latest news in a new convenient format.
👉 Follow the link: https://nt.ls/discord
Discord
Join the Netlas.io Community Server Discord Server!
Connect for support and engage in cybersecurity discussions to enhance your skills and knowledge. | 377 members
👾6👏5
CVE-2024-21006: Vulnerability in Oracle WebLogic Server, 7.5 rating❗
Vulnerability from the report on the new Oracle patch. Allows an unauthenticated attacker to gain unauthorized access to critical activities. According to NVD, exploitation is quite simple.
Search at Netlas.io:
👉 Link: https://nt.ls/RrPD2
👉 Dork: port:7001 AND protocol:t3
Read more: https://nvd.nist.gov/vuln/detail/CVE-2024-21006
Vulnerability from the report on the new Oracle patch. Allows an unauthenticated attacker to gain unauthorized access to critical activities. According to NVD, exploitation is quite simple.
Search at Netlas.io:
👉 Link: https://nt.ls/RrPD2
👉 Dork: port:7001 AND protocol:t3
Read more: https://nvd.nist.gov/vuln/detail/CVE-2024-21006
👾5🔥4👍3