-
People View all
@RealTryHackMe Learn cyber security easily, without downloading anything, from the cloud. Discord: http://discord.gg/tryhackme
@CVEannounce Account maintained by the CVE Team to update the community on CVE related announcements. Additional feeds: https://cve.mitre.org/cve/data_feeds.html …
-
Detecting latest CISCO CVE's on your all targets? here is how you can do it using nuclei, all thanks to
@aboul3la for publishing the POC and@Ice3man543 and v1ll41n for writing nuclei templates for it.#CVE-2020-3187#CVE-2020-3452#infosec#security#pentest#bugbountypic.twitter.com/VKSIHMjL4c
Show this thread -
Shodan dork for CVE-2020-3452 “Set-Cookie: webvpn;”
#bugbounty#bugbountytips#bugbountytip#hackerone#bugcrowd#togetherwehitharder#cve#cisco#vulnerability -
In an hour I’ll be chairing a discussion for
@RUSI_org on the efficacy & evidence of communications-based approaches to#CVE (and the ultimate goal of reducing identity-based violence) w/@NatSecMicah of@MoonshotCVE,@PriyankSMathur@WorldOfMythos & Michael Jones@Rusi_Terrorismpic.twitter.com/It3Gfgy01e
Show this thread -
Vigil@nce
#Vulnerability of PostgreSQL JDBC: external XML entity injection. https://vigilance.fr/vulnerability/PostgreSQL-JDBC-external-XML-entity-injection-32936 … Identifiers:#CVE-2020-13692.#infosecpic.twitter.com/yFzFF77Prb
-
A new year of life is a priceless blessing, so I pray to Allah today with thanks and wish more happy years to come. . . Happy birthday
to me once more. #peacebuilding#cve pic.twitter.com/PFobE4l8Dq
-
Added a Sn1per sc0pe template to detect CVE-2020-3452 - Cisco ASA/FTD Arbitrary File Reading Vulnerability https://github.com/1N3/Sn1per Usage: sniper -f targets.txt -m massweb -c /usr/share/sniper/conf/sc0pe_only_webscan -w targets
#hackers#netsec#CVE#exploit#vulnerability#scan -
Join the CHRIPS webinar today from 2pm - 4pm (EAT) which will discuss the linkages between Al Shabaab in all threee countries
#CVE Register here to get the call-in details: https://bit.ly/chripswebinar pic.twitter.com/fznzVRsaAv
-
Vigil@nce
#Vulnerability of Google Chrome: multiple vulnerabilities. https://vigilance.fr/vulnerability/Google-Chrome-multiple-vulnerabilities-32935 … Identifiers:#CVE-2020-6532,#CVE-2020-6537,#CVE-2020-6538.#watchpic.twitter.com/yyxSUKwtiY
-
Vigil@nce
#Vulnerability of Dell EMC OpenManage Server Administrator: directory traversal. https://vigilance.fr/vulnerability/Dell-EMC-OpenManage-Server-Administrator-directory-traversal-32934 … Identifiers:#CVE-2020-5377.#alertpic.twitter.com/sM2fRLAYl9
-
Vigil@nce
#Vulnerability of TYPO3 Core: information disclosure via Backend User Interface. https://vigilance.fr/vulnerability/TYPO3-Core-information-disclosure-via-Backend-User-Interface-32938 … Identifiers:#CVE-2020-15098.#ITsecuritypic.twitter.com/Q1giDi5Ctl
-
Loginsoft's Research team discovered Multiple Vulnerabilities in the D-link Firmware: CVE-2020-15893- https://research.loginsoft.com/vulnerability/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ …, CVE-2020-15892- https://research.loginsoft.com/vulnerability/classic-stack-based-buffer-overflow-in-dlink-firmware-dap-1520/ …, CVE-2020-15896- https://research.loginsoft.com/vulnerability/authentication-bypass-in-d-link-firmware-dap-1522/ …, CVE-2020-15894&CVE-2020-15895- https://research.loginsoft.com/vulnerability/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ …
#cve#dlink#nvdpic.twitter.com/9wEXTa1h6p
-
Vigil@nce
#Vulnerability of Go: Man-in-the-Middle via Certificate Verify KeyUsages. https://vigilance.fr/vulnerability/Go-Man-in-the-Middle-via-Certificate-Verify-KeyUsages-32915 … Identifiers:#CVE-2020-14039.#watchpic.twitter.com/K8MUwuWhAe
-
Security Research Report on Mercedes-Benz Cars by Chinese team
#skygo - includes official statement by Daimler https://skygo.360.cn/archive/Security-Research-Report-on-Mercedes-Benz-Cars-en.pdf …#mercedes#benz#security#vulnerability#CVE pic.twitter.com/sumdFvmtIl
-
Vigil@nce
#Vulnerability of MilkyTracker: use after free via PlayerGeneric. https://vigilance.fr/vulnerability/MilkyTracker-use-after-free-via-PlayerGeneric-32918 … Identifiers:#CVE-2020-15569.#ITsecuritypic.twitter.com/qjaHZW5d4h
-
Vigil@nce
#Vulnerability of Pulse Connect Secure: multiple vulnerabilities. https://vigilance.fr/vulnerability/Pulse-Connect-Secure-multiple-vulnerabilities-32930 … Identifiers:#CVE-2019-11507,#CVE-2020-12880,#CVE-2020-15408.#securitypic.twitter.com/ALv3rAbF8G
-
Vigil@nce
#Vulnerability of Bootstrap-3-Typeahead: Cross Site Scripting via highlighter. https://vigilance.fr/vulnerability/Bootstrap-3-Typeahead-Cross-Site-Scripting-via-highlighter-32926 … Identifiers:#CVE-2019-10215.#infosecpic.twitter.com/idJ99HQusI
-
This impacts ANY PDF application that does *not* remove unused objects upon digitally signing a document. Alert your users, update and consider moving away from 3rd party apps till this is resolved.
#CVE-2020-9592#CVE-2020-9596 https://www.zdnet.com/article/new-shadow-attack-can-replace-content-in-digitally-signed-pdf-files/ … -
Saturday with Dork
#Dork is related to#CVE-2018-6389 WordPress 4.9.x unauthenticated attackers can cause a resource consumption by using the large list of registered .js files.#WordPress#infosec#cybersecuritypic.twitter.com/blHT6yXDAL
-
#CVE-2020-13777 GnuTLS audit: be scared https://anarc.at/blog/2020-06-10-gnutls-audit/ …
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.