Explore tweets tagged as #Dotnetnuke
Continuing @SLCyberβs Christmas in July posts, our Security Research team discovered a pre-authentication NTLM hash disclosure vulnerability in DNN (formerly DotNetNuke), assigned CVE-2025-52488. Read more on our blog here:
0
8
49
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke) #DNNExploit #UnicodeNormalization #NTLMCredentials #DotNetVulnerability #SMBAttack
0
3
8
β‘ CVE-2017-9822 DotNetNuke Cookie Deserialization Remote Code Execution (RCE) on .π¨π»βπ» @# β MTN Group .π Critical.π° None.π #bugbounty #bugbountytips #cybersecurity #infosec
0
3
23
π¨ CVE-2025-52488 - high π¨. DNN (DotNetNuke) - Unicode Path Normalization NTLM Hash Disclosure. > DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in . πΎ @pdnuclei #NucleiTemplates #cve.
0
2
24
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke):. #dotnet #infosec #informationsecurity #cybersecurity #exploitationΒ #exploit.
0
1
1
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke) #cyber #threathunting #infosec.
0
1
0
π¨ CVE-2025-52485: DotNetNuke (DNN) versions 6.0.0 to 10.0.0 are vulnerable to script injection via the activity feed attachment endpoint. Upgrade to 10.0.1 ASAP! π‘οΈ #Cybersecurity #DNN #Vulnerability.
0
0
0
Recently I was a guest on the @Hanselminutes podcast produced by @shanselman . We had a great conversation reflecting on 2 decades of .NET, sustainable open source, DotNetNuke and Oqtane. #opensource #oqtane
1
3
25