Netlas.io (@netlas_io) 's Twitter Profile
Netlas.io

@netlas_io

Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.

ID: 1329396092409143296

linkhttp://netlas.io calendar_today19-11-2020 12:09:00

467 Tweet

6,6K Takipçi

11 Takip Edilen

Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-1974: Vuln in Kubernetes Ingress Controller, 9.8 rating 🔥 In some cases, an unauth attacker may be able to RCE in the context of the ingress-nginx controller. Search at Netlas.io: 👉 Link: nt.ls/G6SC7 #cybersecurity #vulnerability_map

CVE-2025-1974: Vuln in Kubernetes Ingress Controller, 9.8 rating 🔥

In some cases, an unauth attacker may be able to RCE in the context of the ingress-nginx controller.

Search at Netlas.io:
👉 Link: nt.ls/G6SC7

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-30232: Use-after-free in Exim, "medium" rating❗️ Vuln in some versions of Exim potentially allows an attacker to perform Privilege Escalation, if he has CLI access. Search at Netlas.io: 👉 Link: nt.ls/mtDNc #cybersecurity #vulnerability_map

CVE-2025-30232: Use-after-free in Exim, "medium" rating❗️

Vuln in some versions of Exim potentially allows an attacker to perform Privilege Escalation, if he has CLI access.

Search at Netlas.io:
👉 Link: nt.ls/mtDNc

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-2294: Path Traversal in Kubio WordPress plugin, 9.8 rating 🔥 Vuln found in a popular plugin allows unauth attackers to execute any code in PHP files on the server. Search at Netlas.io: 👉 Link: nt.ls/iOqr6 #cybersecurity #vulnerability_map

CVE-2025-2294: Path Traversal in Kubio WordPress plugin, 9.8 rating 🔥

Vuln found in a popular plugin allows unauth attackers to execute any code in PHP files on the server.

Search at Netlas.io:
👉 Link: nt.ls/iOqr6

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-3083, -3084, -3085: Vulns in MongoDB, 6.5 - 8.1 rating❗️ Vulns in some versions of MongoDB allow attackers to perform DoS and gain unauthorized access. Search at Netlas.io: 👉 Link: nt.ls/aqCrV #cybersecurity #vulnerability_map #mongodb

CVE-2025-3083, -3084, -3085: Vulns in MongoDB, 6.5 - 8.1 rating❗️

Vulns in some versions of MongoDB allow attackers to perform DoS and gain unauthorized access.

Search at Netlas.io:
👉 Link: nt.ls/aqCrV

#cybersecurity #vulnerability_map #mongodb
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-31720, ... , -31728: Multiple vulns in Jenkins, 4.3 - 8.8 rating❗️ The latest Jenkins advisory fixes nine vulns, including Sandbox Bypass, CSRF, etc. Search at Netlas.io: 👉 Link: nt.ls/b2I7a #cybersecurity #vulnerability_map #jenkins

CVE-2025-31720,  ... , -31728: Multiple vulns in Jenkins, 4.3 - 8.8 rating❗️

The latest Jenkins advisory fixes nine vulns, including Sandbox Bypass, CSRF, etc.

Search at Netlas.io:
👉 Link: nt.ls/b2I7a

#cybersecurity #vulnerability_map #jenkins
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-22457: RCE in Ivanti Connect Secure, 9.0 rating 🔥 A buffer overflow in Ivanti Connect Secure allows an unauthenticated attacker to perform remote code execution. Search at Netlas.io: 👉 Link: nt.ls/zsWig #cybersecurity #vulnerability_map

CVE-2025-22457: RCE in Ivanti Connect Secure, 9.0 rating 🔥

A buffer overflow in Ivanti Connect Secure allows an unauthenticated attacker to perform remote code execution.

Search at Netlas.io:
👉 Link: nt.ls/zsWig

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-31489: Vulnerability in MinIO, 8.7 rating❗️ Vulnerability allows an attacker to upload objects using any arbitrary secret. Search at Netlas.io: 👉 Link: nt.ls/TEvNJ #cybersecurity #vulnerability_map

CVE-2025-31489: Vulnerability in MinIO, 8.7 rating❗️

Vulnerability allows an attacker to upload objects using any arbitrary secret.

Search at Netlas.io:
👉 Link: nt.ls/TEvNJ

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-24446 and other: Multiple vulns in Adobe ColdFusion, 7.5 - 9.1 rating 🔥 Adobe disclosed 11 vulns that could lead to arbitrary file system read, and code execution. Search at Netlas.io: 👉 Link: nt.ls/tDhgz #cybersecurity #vulnerability_map

CVE-2025-24446 and other: Multiple vulns in Adobe ColdFusion, 7.5 - 9.1 rating 🔥

Adobe disclosed 11 vulns that could lead to arbitrary file system read, and code execution.

Search at Netlas.io:
👉 Link: nt.ls/tDhgz

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-3102: Incorrect Comparison in SureTriggers WP plugin, 8.1 rating❗️ Failure to check for an empty key value could allow an attacker to bypass the auth process. Search at Netlas.io: 👉 Link: nt.ls/JK81c #cybersecurity #vulnerability_map

CVE-2025-3102: Incorrect Comparison in SureTriggers WP plugin, 8.1 rating❗️

Failure to check for an empty key value could allow an attacker to bypass the auth process.

Search at Netlas.io:
👉 Link: nt.ls/JK81c

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-25226, -25227: SQLi and Improper Auth in Joomla, 7.5 - 9.8 rating 🔥 Vulns in Joomla CMS and Database package allow an attacker to bypass the 2FA or perform SQLi. Search at Netlas.io: 👉 Link: nt.ls/nxRtD #cybersecurity #vulnerability_map

CVE-2025-25226, -25227: SQLi and Improper Auth in Joomla, 7.5 - 9.8 rating 🔥

Vulns in Joomla CMS and Database package allow an attacker to bypass the 2FA or perform SQLi.

Search at Netlas.io:
👉 Link: nt.ls/nxRtD

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-3439: Deserialization of Untrusted Data in Everest Forms, 9.8 rating 🔥 Vuln in the 'field_value' allows a remote unauth attacker to perform PHP object injection. Search at Netlas.io: 👉 Link: nt.ls/CoAb6 #cybersecurity #vulnerability_map

CVE-2025-3439: Deserialization of Untrusted Data in Everest Forms, 9.8 rating 🔥

Vuln in the 'field_value' allows a remote unauth attacker to perform PHP object injection. 

Search at Netlas.io:
👉 Link: nt.ls/CoAb6

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-32102, -32103: Multiple vulns in CrushFTP❗️ Vulns in the popular file transfer web service include Directory Traversal and SSRF. A PoC has also been published. Search at Netlas.io: 👉 Link: nt.ls/NStLF #cybersecurity #vulnerability_map

CVE-2025-32102, -32103: Multiple vulns in CrushFTP❗️

Vulns in the popular file transfer web service include Directory Traversal and SSRF. A PoC has also been published.

Search at Netlas.io:
👉 Link: nt.ls/NStLF

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-24970: Improper Input Validation in Confluence Data Center&Server, 7.5 rating❗️ Vuln in the Netty framework could lead to DoS if an attacker sends a special packet. Search at Netlas.io: 👉 Link: nt.ls/jcVrv #cybersecurity #vulnerability_map

CVE-2025-24970: Improper Input Validation in Confluence Data Center&Server, 7.5 rating❗️

Vuln in the Netty framework could lead to DoS if an attacker sends a special packet.

Search at Netlas.io:
👉 Link: nt.ls/jcVrv

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

👾 Friendly Reminder 👾 The Track Adversary Infrastructure Challenge is starting in two weeks! If you want to take part but haven't registered yet, do it ASAP❗️ 👉 Read more about the competition: netlas.io/promo/ti-chall…

Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-3616: File Upload in Greenshift WordPress Plugin, 8.8 rating❗️ Vuln discovered by Wordfence allows attackers to upload arbitrary files and execute them remotely. Search at Netlas.io: 👉 Link: nt.ls/meWm0 #cybersecurity #vulnerability_map

CVE-2025-3616: File Upload in Greenshift WordPress Plugin, 8.8 rating❗️

Vuln discovered by Wordfence allows attackers to upload arbitrary files and execute them remotely.

Search at Netlas.io:
👉 Link: nt.ls/meWm0

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

❗️Technical Issue Alert❗️ We're currently experiencing issues with backups, which has taken the IP/Domain Info and Responses Search offline. We expect to have everything back up within the next 1–2 hours. 👉 You can also follow the Netlas status here: status.netlas.io

Netlas.io (@netlas_io) 's Twitter Profile Photo

✅ Service Restored 🛠 The restoration is nearly complete, and all tools are now back online. You can safely resume your work! Thanks for bearing with us 🙌

Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-1763, -2443 and other: Multiple vulns in GitLab, 4.3 - 8.7 rating❗️ In a recent advisory, GitLab shared information about several fixed vulns, including XSS and DoS. Search at Netlas.io: 👉 Link: nt.ls/XxMjv #cybersecurity #vulnerability_map

CVE-2025-1763, -2443 and other: Multiple vulns in GitLab, 4.3 - 8.7 rating❗️

In a recent advisory, GitLab shared information about several fixed vulns, including XSS and DoS.

Search at Netlas.io:
👉 Link: nt.ls/XxMjv

#cybersecurity #vulnerability_map
Netlas.io (@netlas_io) 's Twitter Profile Photo

📢 Incident update: Due to an issue reported yesterday, the most recent data was temporarily unavailable in search. The issue has been fixed, and all data is now up to date. Sorry for the inconvenience!

Netlas.io (@netlas_io) 's Twitter Profile Photo

CVE-2025-32432: RCE in CraftCMS, 10.0 rating 🔥🔥🔥 0-day vuln makes some versions of CraftCMS vulnerable to RCE. Used in the wild in combination with CVE-2024-58136. Search at Netlas.io: 👉 Link: nt.ls/XVVPd #cybersecurity #vulnerability_map

CVE-2025-32432: RCE in CraftCMS, 10.0 rating 🔥🔥🔥

0-day vuln makes some versions of CraftCMS vulnerable to RCE. Used in the wild in combination with CVE-2024-58136.

Search at Netlas.io:
👉 Link: nt.ls/XVVPd

#cybersecurity #vulnerability_map