Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
Lo anterior es una vulnerabilidad de Windows 10
#exploit
PoCs for exploiting CVE-2021-21847,
CVE-2021-21853, CVE-2021-21845,
CVE-2021-21846, CVE-2021-21844
CVE-2021-21839:
https://github.com/AlAIAL90/CVE-2021-21847
https://github.com/AlAIAL90/CVE-2021-21853
https://github.com/AlAIAL90/CVE-2021-21845
https://github.com/AlAIAL90/CVE-2021-21846
https://github.com/AlAIAL90/CVE-2021-21844
https://github.com/AlAIAL90/CVE-2021-21839
// Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project
Irlanda impone a WhatsApp una multa histórica de 266 millones de dólares por violación de la privacidad de datos
#exploit
CVE-2021-1588:
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1588
]-> A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1590
]-> A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches 
https://github.com/AlAIAL90/CVE-2021-1591
[webapps] Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
Patient Appointment Scheduler System 1.0 - Unauthenticated File Upload & Remote Code Execution (RCE)
https://www.exploit-db.com/exploits/50264
Comunidad Pen7esting pinned «Al parecer tomaron mi script y lo han mejorado. https://github.com/Anonimo501/SambaRelay»
#exploit
CVE-2021-33909 - Sequoia PoC
https://github.com/ChrisTheCoolHut/CVE-2021-33909
// fs/seq_file.c in the Linux kernel 3.16 - 5.13 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user
[webapps] WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
Microsoft shares temp fix for ongoing Office 365 zero-day attacks

Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.

The flaw is in MSHTML, the browser rendering engine that is also used by Microsoft Office documents.

https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
New 0-Day Attack Targeting Windows Users With Microsoft Office Documents https://thehackernews.com/2021/09/new-0-day-attack-targeting-windows.html
CVE-2020-10188 PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)

Description
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.

The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.

This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.

https://security.paloaltonetworks.com/CVE-2020-10188