TrelloC2 – Simple C2 Over The Trello API

[![](https://blogger.googleusercontent.com/img/a/AVvXsEhYBbHXwyhm74b8IQwmi-Wc-tE9lBbgcf0WU4kT9UfioRNG-DQPHJKs60BO3fiuhb0xYt7Ay1ERuT1VhtZ5iF1Iqpf8s_uKxFg1k2jmZgs8wHsj9GxN0lpNmrCqJS4uqFmU9aCtmnSw59QZty9 ...

Continue Reading
Weave GitOps leaked cluster credentials into logs on connection errors

### Impact A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, inclu ...

Continue Reading
Weave GitOps leaked cluster credentials into logs on connection errors

### Impact A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, inclu ...

Continue Reading
PYSEC-2022-210

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still r ...

Continue Reading
Log Injection in Apache Sling Commons Log and Apache Sling API

Apache Sling Commons Log Read More ...

Continue Reading
Log Injection in Apache Sling Commons Log and Apache Sling API

Apache Sling Commons Log Read More ...

Continue Reading
CVE-2022-22967

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still r ...

Continue Reading
Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-f ...

Continue Reading

Back to Main

Subscribe for the latest news: