GHSA-jfh8-c2jp-5v3q
tsunami-security-scanner
GHSA-jfh8-c2jp-5v3q | tsunami-security-scanner | |
---|---|---|
9 | 4 | |
- | 8,121 | |
- | 0.4% | |
- | 7.5 | |
- | 3 days ago | |
Java | ||
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
GHSA-jfh8-c2jp-5v3q
- GLPI IS NOT affected by the Log4j vulnerability CVE-2021-44228
-
Ghidra 10.1 Released
Includes fix for CVE-2021-44228 (https://github.com/advisories/GHSA-jfh8-c2jp-5v3q)
- Is this something that effects mining machines as well ? Any miner that can enlighten me about this problem?
- Warning for people playing on Minecraft servers. This is important!
- Security Issue - Minecraft 1.18.1 Release Candidate 3 Is Out!
-
WARNING: DO NOT LOG ONTO PUBLIC SERVERS, NEW ZERO-DAY SECURITY VULNERABILITY FOUND FOR 1.7-1.18
GitHub posted an advisory heres the link and proof-of-concept for those of you interested. https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
- Remote code injection in Log4j
- Log4j RCE Found
tsunami-security-scanner
- Qualys Community Edition for vuln. scanning?... limitations?
-
Log4j RCE Found
https://github.com/google/tsunami-security-scanner (I bet it would be easy to write a plugin for https://github.com/projectdiscovery/nuclei as well.)
To see if there are injection points statically, I work on a tool (https://github.com/returntocorp/semgrep) that someone else already wrote a check with: https://twitter.com/lapt0r/status/1469096944047779845 or look for the mitigation with `semgrep -e '$LOGGER.formatMsgNoLookups(true)' --lang java`. For the mitigation, the string should be unique enough that just ripgrep works well too.
-
Security and self-hosting, bumping a 7 months old thread
Thanks to you I just reenabled Tsunami https://github.com/google/tsunami-security-scanner. Also had software called something like vuln (blue logo with a yellow eye in the middle) running. but the hard disk of the server died --sadly and I can't remember how it was called.-- https://vuls.io/
-
Awesome Penetration Testing
Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
What are some alternatives?
Apache Log4j 2 - Apache Log4j 2 is a versatile, feature-rich, efficient logging API and backend for Java.
logging-log4j1 - Apache log4j1
tsunami-security-scanner-plugins - This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
docker-gvm - Docker container stack for GVM / OpenVAS
log4shell - Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
FizzBuzz Enterprise Edition - FizzBuzz Enterprise Edition is a no-nonsense implementation of FizzBuzz made by serious businessmen for serious business purposes.
go-cache - An in-memory key:value store/cache (similar to Memcached) library for Go, suitable for single-machine applications.
terminal-escape-injections - A repository dedicated to terminal escape injections.
ZAP - The ZAP core project