Home Honeypots Advisories Threat Intel Twitter Logo@DTCERT About

Telekom Security

Home Honeypots Advisories Threat Intel Twitter Logo@DTCERT About
  • Juniper Junos Space prior to 19.4R1 Local File Inclusion Vulnerability

    31 Jan 2020 • Advisories

    A Local File Inclusion vulnerability (CVE-2020-1611) in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets.

    Continue Reading →

  • wolfSSL TLSv1.3 Remote Buffer Overflow

    20 May 2019 • Advisories

    A new critical remote buffer overflow vulnerability (CVE-2019-11873) was discovered in the wolfSSL library (version 4.0.0-stable, http://www.wolfssl.com) by Security Evaluators of Telekom Security with modern fuzzing methods. The vulnerability allows an attacker to overwrite a large part of the RAM of a wolfSSL server with hisdata over the network.

    View the full advisory

    Continue Reading →

  • axTLS Remote Buffer Overflow

    22 Mar 2019 • Advisories

    A new critical remote buffer overflow vulnerability (CVE-2019-8981) in the axTLS library for embedded devices (version 2.1.4, http://axtls.scourceforge.net was discovered on 2019 February 20 with modern fuzzing methods, which possibly allows remote code execution. A new fixed version (2.1.5) countering this is now available for download.

    View the full advisory

    Continue Reading →

  • T-Pot Version 19.03 released

    04 Jan 2019 • Honeypots

    In Mach 2019 we released T-Pot 19.03. Read more Details here.

    Continue Reading →

  • WeBid Directory Traversal, Blind SQL Injection and XSS

    03 Dec 2018 • Advisories

    Multiple vulnerabilities were identified in version 1.2.2 of the popular “WeBid” open source auction system. Patches for all three vulnerabilities are available in their GitHub, and will be included in the next release.

    Continue Reading →

  • ServiceNow Glide Scripting injection leading to privilege escalation

    27 Jul 2018 • Advisories

    ServiceNow, an enterprise IT service management solution, is vulnerable to an template injection vulnerability, leading to a full privilege escalation.

    Continue Reading →

  • Variant of Satori/Mirai detected attacking public available ADB shells

    10 Jul 2018 • Advisories • Research

    On the 10th of July at 23:30 UTC we noticed an increased traffic on our blackhole monitoring on TCP port 5555. Upon further analysis, we saw a big chunk of this traffic coming from China, USA and the Dominican Republic. In total we gathered 246.434 packets from 68.361 unique IPs. Based on the packet details we gathered, we can assume that the packets were generated by a lot of different devices. In addition, the traffic behavior on port 5555 matches the typicall scan behavior of botnets.

    Continue Reading →

  • Trovebox - Authentication Bypass, SQLi, SSRF

    30 Apr 2018 • Advisories

    Trovebox, a photo sharing and management application, is prone to several critical vulnerabilities. Exploiting is trivial and it is recommended to update to the fixed version from Github.

    Continue Reading →

« 1 2 3 4 5 6 7 8 »
Imprint • Disclaimer • Privacy Policy