Search the Community
Showing results for tags 'validation'.
-
A Subdomain Enumeration and Validation tool for Bug Bounty and Pentesters. Key Features OSINT + Subdomain Bruteforcing Capable of handling outputs from multiple tools Handling False Positives and Filters subdomains with same resolutions. Checking for Server Banners and Ports Incredibly Fast Handling domains with larger scopes Port Scanning [hide][Hidden Content]]
-
Email Verifier Pro is a professional tool which allows you to do verifying bulk list of email addresses and validating them in a background email scanning process and shows scan results with an easy to read report divided into multiple categories like valid, invalid, duplicates, unknown, syntax error addresses. All verified clean email address can be downloaded as CSV or save a clean list in the database for later use from lead management. Which can be used for sending bulk emails to your clients and customers for email marketing purpose. [Hidden Content] [hide][Hidden Content]]
-
Email Verifier Pro is a professional tool which allows you to do verifying bulk list of email addresses and validating them in a background email scanning process and shows scan results with an easy to read report divided into multiple categories like valid, invalid, duplicates, unknown, syntax error addresses. All verified clean email address can be downloaded as CSV or save a clean list in the database for later use from lead management. Which can be used for sending bulk emails to your clients and customers for email marketing purpose. [Hidden Content] [hide][Hidden Content]]
-
IcedTeaWeb suffers from multiple vulnerabilities including directory traversal and validation bypass issues that can lead to remote code execution. The affected versions are 1.7.2 and below, 1.8.2 and below. 1.6 is also vulnerable and not patched due to being EOL. Proof of concepts are provided. View the full article
-
- icedteaweb
- validation
-
(and 5 more)
Tagged with:
-
A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected. View the full article
-
Open-Xchange OX Guard versions 7.10.2 and below suffer from a cross site scripting vulnerability. Open-Xchange OX Guard versions 7.10.1 and below, 2.10.2 and below suffer from a signature validation vulnerability. View the full article
-
- open-xchange
- guard
-
(and 5 more)
Tagged with:
-
OmniDoc version 7.0 suffers from an improper input validation vulnerability. View the full article
-
In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path. This module will attempt to extract a payload to the startup folder of the current user. It is limited such that we can only go back one folder. Therefore, for this exploit to work properly, the user must extract the supplied RAR file from one folder within the user profile folder (e.g. Desktop or Downloads). User restart is required to gain a shell. View the full article
-
The SAML SSO addon in JFrog Artifactory version 6.5.9 does not properly validate the XML signature in the SAMLResponse field send to the URL /webapp/saml/loginResponse. An attacker can use this flaw to login as any user if they already can login as some user. View the full article
-
- jfrog
- artifactory
-
(and 4 more)
Tagged with:
-
Exploits Python GnuPG 0.4.3 Improper Input Validation
1337day-Exploits posted a topic in Updated Exploits
Researchers discovered a way to inject data through the passphrase property of the gnupg.GPG.encrypt() and gnupg.GPG.decrypt() methods when symmetric encryption is used. The supplied passphrase is not validated for newlines, and the library passes --passphrase-fd=0 to the gpg executable, which expects the passphrase on the first line of stdin, and the ciphertext to be decrypted or plaintext to be encrypted on subsequent lines. By supplying a passphrase containing a newline an attacker can control/modify the ciphertext/plaintext being decrypted/encrypted. Proof of concept exploit included. Version 0.4.3 is affected. View the full article -
The Everus.org Android application version1.0.7 has a fundamental design flaw where the server provides the second factor to the client for comparison instead of properly validating it server-side. View the full article
-
- 1.0.7
- everus.org
-
(and 4 more)
Tagged with: