techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.4K
active users

#vulncheck

0 posts0 participants0 posts today
Pyrzout :vm:<p>Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825) <a href="https://www.helpnetsecurity.com/2025/04/01/crushftp-vulnerability-exploitation-cve-2025-2825/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/04/01</span><span class="invisible">/crushftp-vulnerability-exploitation-cve-2025-2825/</span></a> <a href="https://social.skynetcloud.site/tags/Shadowserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shadowserver</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrushFTP</span></a> <a href="https://social.skynetcloud.site/tags/Rapid7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rapid7</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://social.skynetcloud.site/tags/PoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoC</span></a></p>
Pyrzout :vm:<p>Swap EOL Zyxel routers, upgrade Netgear ones! <a href="https://www.helpnetsecurity.com/2025/02/05/swap-eol-zyxel-routers-upgrade-netgear-ones-patches-cve-2024-40891/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/02/05</span><span class="invisible">/swap-eol-zyxel-routers-upgrade-netgear-ones-patches-cve-2024-40891/</span></a> <a href="https://social.skynetcloud.site/tags/securityupdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityupdate</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/accesspoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>accesspoint</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Netgear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netgear</span></a> <a href="https://social.skynetcloud.site/tags/router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>router</span></a> <a href="https://social.skynetcloud.site/tags/Zyxel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zyxel</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a></p>
LavX News<p>Zyxel's EoL Routers Under Attack: A Call for Cyber Vigilance</p><p>Zyxel's end-of-life routers are facing active exploitation of critical vulnerabilities, with no patches on the horizon. As attackers target these legacy devices, users are urged to upgrade to secure a...</p><p><a href="https://news.lavx.hu/article/zyxel-s-eol-routers-under-attack-a-call-for-cyber-vigilance" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/zyxel-s-e</span><span class="invisible">ol-routers-under-attack-a-call-for-cyber-vigilance</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/Zyxel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zyxel</span></a> <a href="https://mastodon.cloud/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a></p>
Pyrzout :vm:<p>Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) <a href="https://www.helpnetsecurity.com/2025/01/29/zyxel-cpe-devices-under-attack-vulnerability-cve-2024-40891/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/01/29</span><span class="invisible">/zyxel-cpe-devices-under-attack-vulnerability-cve-2024-40891/</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyNoise</span></a> <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Censys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Censys</span></a> <a href="https://social.skynetcloud.site/tags/Zyxel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zyxel</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a></p>
Pyrzout :vm:<p>400,000 Systems Potentially Exposed to 2023’s Most Exploited Flaws – Source: www.securityweek.com <a href="https://ciso2ciso.com/400000-systems-potentially-exposed-to-2023s-most-exploited-flaws-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/400000-systems-p</span><span class="invisible">otentially-exposed-to-2023s-most-exploited-flaws-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/Exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploited</span></a> <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a></p>
Pyrzout :vm:<p>400,000 Systems Potentially Exposed to 2023’s Most Exploited Flaws <a href="https://www.securityweek.com/400000-systems-potentially-exposed-to-2023s-most-exploited-flaws/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/400000-system</span><span class="invisible">s-potentially-exposed-to-2023s-most-exploited-flaws/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploited</span></a> <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a></p>
Pyrzout :vm:<p>400,000 Systems Potentially Exposed to 2023’s Most Exploited Flaws <a href="https://www.securityweek.com/400000-systems-potentially-exposed-to-2023s-most-exploited-flaws/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/400000-system</span><span class="invisible">s-potentially-exposed-to-2023s-most-exploited-flaws/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploited</span></a> <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a></p>
postmodern<p>Does <span class="h-card" translate="no"><a href="https://infosec.exchange/@vulncheck" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vulncheck</span></a></span> have a way to report that one of their entries in XDB has been deleted from GitHub? Does their XDB code occassionally check the repo URLs to make sure they aren't 404ed?</p><p><a href="https://github.com/admi-n/CVE-2024-3400-RCE-copy" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/admi-n/CVE-2024-340</span><span class="invisible">0-RCE-copy</span></a> is definitely 404ed.<br><a href="https://infosec.exchange/tags/vulncheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulncheck</span></a> <a href="https://infosec.exchange/tags/xdb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xdb</span></a></p>
Pyrzout :vm:<p>Threat-Intelligence Startup VulnCheck Closes $8M Seed Financing <a href="https://www.securityweek.com/threat-intelligence-startup-vulncheck-closes-8m-seed-financing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/threat-intell</span><span class="invisible">igence-startup-vulncheck-closes-8m-seed-financing/</span></a> <a href="https://social.skynetcloud.site/tags/SorensonVentures" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SorensonVentures</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Funding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Funding</span></a>/M&amp;A <a href="https://social.skynetcloud.site/tags/seedstage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seedstage</span></a> <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a></p>
Pyrzout :vm:<p>Threat-Intelligence Startup VulnCheck Closes $8M Seed Financing <a href="https://www.securityweek.com/threat-intelligence-startup-vulncheck-closes-8m-seed-financing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/threat-intell</span><span class="invisible">igence-startup-vulncheck-closes-8m-seed-financing/</span></a> <a href="https://social.skynetcloud.site/tags/SorensonVentures" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SorensonVentures</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Funding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Funding</span></a>/M&amp;A <a href="https://social.skynetcloud.site/tags/seedstage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seedstage</span></a> <a href="https://social.skynetcloud.site/tags/VulnCheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnCheck</span></a></p>
VulnCheck<p>In September, the Moobot botnet was reported to be exploiting CVE-2022-28958 in-the-wild, and the vulnerability was added to the CISA KEV Catalog. But Jake (<span class="h-card"><a href="https://infosec.exchange/@albinolobster" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>albinolobster</span></a></span>) on the <span class="h-card"><a href="https://infosec.exchange/@vulncheck" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vulncheck</span></a></span> Initial Access team quickly discovered MooBot hadn't implemented the exploit correctly. Surprisingly, after further analysis, <span class="h-card"><a href="https://infosec.exchange/@vulncheck" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vulncheck</span></a></span> concluded the vulnerability never even existed in the first place. <a href="https://infosec.exchange/tags/vulncheck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulncheck</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://infosec.exchange/tags/cisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisa</span></a> </p><p>Find the full details on the VulnCheck blog: <br><a href="https://vulncheck.com/blog/moobot-uses-fake-vulnerability" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulncheck.com/blog/moobot-uses</span><span class="invisible">-fake-vulnerability</span></a></p>