I've created a vulnerability detection script here: github.com/rxerium/CVE-...
As reported by Huntress this is an unauthenticated Local File Inclusion flaw in Gladinet CentreStack and Triofox.
I've created a vulnerability detection script here: github.com/rxerium/CVE-...
As reported by Huntress this is an unauthenticated Local File Inclusion flaw in Gladinet CentreStack and Triofox.
I've created a #nuclei script to detect vulnerable instances at scale:
github.com/rxerium/CVE-...
I've created a #nuclei script to detect vulnerable instances at scale:
github.com/rxerium/CVE-...
github.com/rxerium/CVE-...
github.com/rxerium/CVE-...
Check to see if you're vulnerable:
github.com/rxerium/CVE-...
Patches / workarounds are available:
support.sitecore.com/kb?id=kb_art...
Check to see if you're vulnerable:
github.com/rxerium/CVE-...
Patches / workarounds are available:
support.sitecore.com/kb?id=kb_art...
Detection script:
github.com/rxerium/CVE-...
Patches are available:
status.n-able.com/2025/08/13/a...
Detection script:
github.com/rxerium/CVE-...
Patches are available:
status.n-able.com/2025/08/13/a...
github.com/rxerium/CVE-...
www.mitel.com/support/secu...
github.com/rxerium/CVE-...
www.mitel.com/support/secu...
I’ll be sharing insights from my recent contributions to the OWASP Amass project and Project Discovery’s Nuclei, focusing on DNS-based techniques for Product and Service Discovery. More details below:
I’ll be sharing insights from my recent contributions to the OWASP Amass project and Project Discovery’s Nuclei, focusing on DNS-based techniques for Product and Service Discovery. More details below:
~291,903 exposed devices running crushFTP (as of 19.07.25) according to @shodanhq:
`http.html:"crushftp"`
Patch now:
www.crushftp.com/crush11wiki/...
~291,903 exposed devices running crushFTP (as of 19.07.25) according to @shodanhq:
`http.html:"crushftp"`
Patch now:
www.crushftp.com/crush11wiki/...
github.com/rxerium/CVE-...
Around ~4000 instances exposed to the internet as of 25.07.16
`http.favicon.hash:963565804`
github.com/rxerium/CVE-...
Around ~4000 instances exposed to the internet as of 25.07.16
`http.favicon.hash:963565804`
github.com/rxerium/CVE-...
Use at your own risk.
github.com/rxerium/CVE-...
Use at your own risk.
t.co/FLyLb7I0sJ
t.co/FLyLb7I0sJ
nameserver detection:
github.com/projectdisco...
word matching:
github.com/projectdisco...
#security #CyberSecurity
nameserver detection:
github.com/projectdisco...
word matching:
github.com/projectdisco...
#security #CyberSecurity
buff.ly/r6l4pRN
you can use the PowerCLI tool to find versions though this only works locally:
`Get-VMhost | Select-Object Name,Version,Build`
buff.ly/r6l4pRN
you can use the PowerCLI tool to find versions though this only works locally:
`Get-VMhost | Select-Object Name,Version,Build`
we can't detect versions of rsync over the internet but we can extract protocols from which we can map to versions
vulnerable: <= 3.2.7 - protocol 31
unaffected: < 3.4.0 - protocol 32
https://buff.ly/4hx8udb
we can't detect versions of rsync over the internet but we can extract protocols from which we can map to versions
vulnerable: <= 3.2.7 - protocol 31
unaffected: < 3.4.0 - protocol 32
https://buff.ly/4hx8udb