#exploit
PoCs for exploiting CVE-2021-21847,
CVE-2021-21853, CVE-2021-21845,
CVE-2021-21846, CVE-2021-21844
CVE-2021-21839:
https://github.com/AlAIAL90/CVE-2021-21847
https://github.com/AlAIAL90/CVE-2021-21853
https://github.com/AlAIAL90/CVE-2021-21845
https://github.com/AlAIAL90/CVE-2021-21846
https://github.com/AlAIAL90/CVE-2021-21844
https://github.com/AlAIAL90/CVE-2021-21839
// Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project
PoCs for exploiting CVE-2021-21847,
CVE-2021-21853, CVE-2021-21845,
CVE-2021-21846, CVE-2021-21844
CVE-2021-21839:
https://github.com/AlAIAL90/CVE-2021-21847
https://github.com/AlAIAL90/CVE-2021-21853
https://github.com/AlAIAL90/CVE-2021-21845
https://github.com/AlAIAL90/CVE-2021-21846
https://github.com/AlAIAL90/CVE-2021-21844
https://github.com/AlAIAL90/CVE-2021-21839
// Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project
#exploit
CVE-2021-1588:
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1588
]-> A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1590
]-> A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches
https://github.com/AlAIAL90/CVE-2021-1591
CVE-2021-1588:
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1588
]-> A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1590
]-> A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches
https://github.com/AlAIAL90/CVE-2021-1591
[webapps] Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50264
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50264
Exploit Database
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload.. webapps exploit for PHP platform
Comunidad Pen7esting pinned «Al parecer tomaron mi script y lo han mejorado. https://github.com/Anonimo501/SambaRelay»
#exploit
CVE-2021-33909 - Sequoia PoC
https://github.com/ChrisTheCoolHut/CVE-2021-33909
// fs/seq_file.c in the Linux kernel 3.16 - 5.13 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user
CVE-2021-33909 - Sequoia PoC
https://github.com/ChrisTheCoolHut/CVE-2021-33909
// fs/seq_file.c in the Linux kernel 3.16 - 5.13 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user
GitHub
GitHub - ChrisTheCoolHut/CVE-2021-33909: CVE-2021-33909 Sequoia
CVE-2021-33909 Sequoia. Contribute to ChrisTheCoolHut/CVE-2021-33909 development by creating an account on GitHub.
Se publica una vulnerabilidad de WhatsApp que permite acceder a los datos de los usuarios https://unaaldia.hispasec.com/2021/09/se-publica-una-vulnerabilidad-de-whatsapp-que-permite-acceder-a-los-datos-de-los-usuarios.html
Una al Día
Se publica una vulnerabilidad de WhatsApp que permite acceder a los datos de los usuarios
Recientemente, se ha publicado una vulnerabilidad de la aplicación de mensajería WhatsApp que permite acceder a información sensible almacenada en la memoria de dicha aplicación. Dicha información podría ser cualquier tipo de archivo de vídeo o imagen, conversaciones…
😡
📃 "ProtonMail comparte la dirección IP de un activista francés con la policía" https://blog.elhacker.net/2021/09/protonmail-comparte-la-direccion-ip-con-la-policia-activista-frances-detenido.html
📃 "Detienen a un activista francés gracias a su IP: fue entregada por el servicio de correo cifrado ProtonMail tras una orden judicial" https://www.genbeta.com/actualidad/detienen-a-activista-frances-gracias-a-su-ip-fue-entregada-servicio-correo-cifrado-protonmail-orden-judicial
📃 "ProtonMail en tela de juicio tras facilitar a las autoridades la dirección IP de un activista" https://elchapuzasinformatico.com/2021/09/protonmail-en-tela-de-juicio-tras-facilitar-a-las-autoridades-la-direccion-ip-de-un-activista/
📃 "ProtonMail comparte la dirección IP de un activista francés con la policía" https://blog.elhacker.net/2021/09/protonmail-comparte-la-direccion-ip-con-la-policia-activista-frances-detenido.html
📃 "Detienen a un activista francés gracias a su IP: fue entregada por el servicio de correo cifrado ProtonMail tras una orden judicial" https://www.genbeta.com/actualidad/detienen-a-activista-frances-gracias-a-su-ip-fue-entregada-servicio-correo-cifrado-protonmail-orden-judicial
📃 "ProtonMail en tela de juicio tras facilitar a las autoridades la dirección IP de un activista" https://elchapuzasinformatico.com/2021/09/protonmail-en-tela-de-juicio-tras-facilitar-a-las-autoridades-la-direccion-ip-de-un-activista/
Blog elhacker.NET
ProtonMail comparte la dirección IP de un activista francés con la policía
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
VMware parchea fallos que afectaban a varios productos
https://unaaldia.hispasec.com/2021/09/vmware-parchea-fallos-que-afectaban-a-varios-productos.html
https://unaaldia.hispasec.com/2021/09/vmware-parchea-fallos-que-afectaban-a-varios-productos.html
Una al Día
VMware parchea fallos que afectaban a varios productos
Mware hace públicas actualizaciones de seguridad para solucionar las vulnerabilidades que presentaban varios de sus productos.
Tool to audit cobalt strike server default settings (can use to validate cobaltstrike server)
https://github.com/itaymigdal/infosec-scripts/blob/main/CobaltStrike_Server_Auditor.py
https://github.com/itaymigdal/infosec-scripts/blob/main/CobaltStrike_Server_Auditor.py
GitHub
some-scripts/CobaltStrike_Server_Auditor.py at main · itaymigdal/some-scripts
Some Cyber Security related scripts. Contribute to itaymigdal/some-scripts development by creating an account on GitHub.
[webapps] WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
Exploit Database
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
Microsoft shares temp fix for ongoing Office 365 zero-day attacks
Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.
The flaw is in MSHTML, the browser rendering engine that is also used by Microsoft Office documents.
https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.
The flaw is in MSHTML, the browser rendering engine that is also used by Microsoft Office documents.
https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
BleepingComputer
Microsoft shares temp fix for ongoing Office 365 zero-day attacks
Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.
ExploitDB Just tweeted ****************************************** [webapps] WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2) https://t.co/vcJFGQ7Tmw
Exploit Database
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2).. webapps exploit for PHP platform
SCAN CON NMAP DESDE UN NAVEGADOR https://blog.ehcgroup.io/2021/09/07/10/04/01/11722/scan-con-nmap-desde-un-navegador/herramientas-de-seguridad/ehacking/
Blog EHCGroup
Scan con Nmap desde un navegador
Rainmap es una aplicación web diseñada en Django para ejecutar escaneos de Nmap desde cualquier navegador web y fue diseñado para ser liviano y depender de la menor cantidad posible de dependencias. Es perfecto para
New 0-Day Attack Targeting Windows Users With Microsoft Office Documents https://thehackernews.com/2021/09/new-0-day-attack-targeting-windows.html
CVE-2020-10188 PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)
Description
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.
This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.
https://security.paloaltonetworks.com/CVE-2020-10188
Description
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.
This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.
https://security.paloaltonetworks.com/CVE-2020-10188
Palo Alto Networks Product Security Assurance
CVE-2020-10188 PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative ...
The Telnet-based administrative ...