Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
Cisco SD-WAN Software Information Disclosure Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-mpls-infodisclos-MSSRFkZq?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20SD-WAN%20Software%20Information%20Disclosure%20Vulnerability&vs_k=1

A vulnerability in the Multiprotocol Label Switching (MPLS) packet handling function of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to gain access to information stored in MPLS buffer memory.
This vulnerability is due to insufficient handling of malformed MPLS packets that are processed by a device that is running Cisco SD-WAN Software. An attacker could exploit this vulnerability by sending a crafted MPLS packet to an affected device that is running Cisco SD-WAN Software or Cisco SD-WAN vManage Software. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-mpls-infodisclos-MSSRFkZq



Security Impact Rating: Medium



CVE: CVE-2021-1614
Cositas básicas

📃 "Así es cómo tu CPU y GPU realizan los cálculos matemáticos en tu PC" https://hardzone.es/reportajes/que-es/alu/

📃 "Disco duro: qué es, tipos y cómo funciona" https://www.elgrupoinformatico.com/noticias/disco-duro-que-tipos-como-funciona-t79244.html

📃 "Qué es la memoria RAM y cómo funciona" https://www.profesionalreview.com/2018/11/01/memoria-ram/

📃 "Controla el funcionamiento de tu tarjeta de red con NetworkCountersWatch" https://www.redeszone.net/2017/09/25/networkcounterswatch-informacion-tarjeta-red/

📃 "¿Cómo funciona un router?" https://www.cisco.com/c/es_mx/solutions/small-business/resource-center/networking/how-does-a-router-work.html

📃 "La informática forense en la investigación de delitos" https://protecciondatos-lopd.com/empresas/informatica-forense/

📃 "Cómo proteger tu empresa gracias a una auditoría de ciberseguridad" https://keepcoding.io/blog/auditoria-de-ciberseguridad/

📃 "¿Qué es un pentesting, o prueba de penetración?" https://nordvpn.com/es/blog/que-es-el-pentesting/

🎓 "Curso de Wireless Penetration Testing con Kali linux" https://www.youtube.com/watch?v=2TFnEcJEL10&list=PL-G03HRCQgdFKAaW718J14tKDM63mGirL

📃 "¿Qué es una VPN?" https://nordvpn.com/es/what-is-a-vpn/

Descuento a una VPN para los suscriptores de @seguridadinformatic4 Utiliza el cupón informatica o entra directamente en este enlace: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=45752&url_id=11987
# CVE-2017-9841. The exploit targets Drupal sites that currently or
previously used the Mailchimp or Mailchimp commerce module and still have a
vulnerable version of the file
sites/all/libraries/mailchimp/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php.
See below for details on whether a file is vulnerable or not. The vulnerable
file might be at other paths on your individual site, but an automated attack
exists that is looking for that specific path. This attack can execute PHP on
the server
Nuevo video! Esta vez de la máquina Anonymous, de la plataforma THM, cualquier feedback es de mucha ayuda gracias!
https://www.youtube.com/watch?v=GH2FFIGd-y4
El gobierno de Chile ha puesto urgencia a la discusión del TPP en el Senado. Su aprobación significará mayores restricciones y persecución en la actividad digital y en el intercambio de contenidos. Más información ⬇️
https://colectivodisonancia.net/2021/01/no-al-tpp/

Infografía TPP: https://colectivodisonancia.net/no-al-tpp-info/
Gracias a todos los nuevos integrantes del grupo, por estar aquí y a los que siempre han estado desde el comienzo, un saludo y no olviden compartir el canal para que podamos seguir creciendo muchas gracias a todos.

Canal en telegram
🛡 Comunidad Anonimo501 💻📱🖥
https://t.me/Pen7esting

Canal de Youtube
https://youtube.com/c/Anonimo501

Github
https://github.com/Anonimo501
[webapps] Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
https://www.exploit-db.com/exploits/50158
CVE-2020-4974

IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).

https://cve.reconshell.com/cve/CVE-2020-4974