Bishopfox

Sliver

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.02.2026 20:34:31
  • Zuletzt bearbeitet 23.02.2026 17:42:31

Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.7.0, the DNS C2 listener accepts unauthenticated TOTP bootstrap messages and allocates server-side DNS sessions without validating OTP values, even when Enfor...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 06.02.2026 21:32:27
  • Zuletzt bearbeitet 19.02.2026 18:02:59

Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a path traversal in the website content subsystem lets an authenticated operator read arbitrary files on the Sliver server host. This is an authenticate...

  • EPSS 0.06%
  • Veröffentlicht 28.10.2025 19:29:16
  • Zuletzt bearbeitet 30.10.2025 15:05:32

Sliver is a command and control framework that uses a custom Wireguard netstack. In versions 1.5.43 and earlier, and in development version 1.6.0-dev, the netstack does not limit traffic between Wireguard clients. This allows clients to communicate w...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 19.02.2025 22:15:24
  • Zuletzt bearbeitet 27.02.2025 20:18:12

Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on ...

  • EPSS 0.23%
  • Veröffentlicht 18.07.2024 23:15:02
  • Zuletzt bearbeitet 21.11.2024 09:32:15

Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver version 1.6.0 (prerelease) is vulnerable to RCE on the teamserver by a low-privileged "op...

  • EPSS 0.05%
  • Veröffentlicht 28.08.2023 12:15:09
  • Zuletzt bearbeitet 21.11.2024 08:07:34

Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses.