[webapps] WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
https://www.exploit-db.com/exploits/50268
Exploit Database
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS)
WordPress Plugin WP Sitemap Page 1.6.4 - Stored Cross-Site Scripting (XSS).. webapps exploit for PHP platform
Microsoft shares temp fix for ongoing Office 365 zero-day attacks
Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.
The flaw is in MSHTML, the browser rendering engine that is also used by Microsoft Office documents.
https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.
The flaw is in MSHTML, the browser rendering engine that is also used by Microsoft Office documents.
https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
BleepingComputer
Microsoft shares temp fix for ongoing Office 365 zero-day attacks
Microsoft today shared mitigation for a remote code execution vulnerability in Windows that is being exploited in targeted attacks against Office 365 and Office 2019 on Windows 10.
ExploitDB Just tweeted ****************************************** [webapps] WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2) https://t.co/vcJFGQ7Tmw
Exploit Database
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2)
WordPress Plugin Survey & Poll 1.5.7.3 - 'sss_params' SQL Injection (2).. webapps exploit for PHP platform
SCAN CON NMAP DESDE UN NAVEGADOR https://blog.ehcgroup.io/2021/09/07/10/04/01/11722/scan-con-nmap-desde-un-navegador/herramientas-de-seguridad/ehacking/
Blog EHCGroup
Scan con Nmap desde un navegador
Rainmap es una aplicación web diseñada en Django para ejecutar escaneos de Nmap desde cualquier navegador web y fue diseñado para ser liviano y depender de la menor cantidad posible de dependencias. Es perfecto para
New 0-Day Attack Targeting Windows Users With Microsoft Office Documents https://thehackernews.com/2021/09/new-0-day-attack-targeting-windows.html
CVE-2020-10188 PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)
Description
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.
This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.
https://security.paloaltonetworks.com/CVE-2020-10188
Description
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.
This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.
https://security.paloaltonetworks.com/CVE-2020-10188
Palo Alto Networks Product Security Assurance
CVE-2020-10188 PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative ...
The Telnet-based administrative ...
📃 "PunkSpider: el retorno del polémico 'buscador para hackers' que escaneará y publicará las vulnerabilidades de los sitios web" https://www.genbeta.com/seguridad/punkspider-retorno-polemico-buscador-para-hackers-que-escaneara-publicara-vulnerabilidades-sitios-web
🛠 https://punkspider.org/
🛠 https://punkspider.org/
Genbeta
PunkSpider: el retorno del polémico 'buscador para hackers' que escaneará y publicará las vulnerabilidades de los sitios web
Podemos encontrar casi cualquier cosa en Internet: sólo hace falta recurrir a un buscador y tendremos en unos segundos esa noticia, receta o artículo de...
Ransom DDoS (RDDoS): ¿Qué Significa un Ataque DDoS con Extorsión?
https://esgeeks.com/rddos-ataque-ddos-extorsion/?feed_id=8782&_unique_id=6139725c36b28
https://esgeeks.com/rddos-ataque-ddos-extorsion/?feed_id=8782&_unique_id=6139725c36b28
EsGeeks
▷ Ransom DDoS: ¿Qué Significa Ataque DDoS con Extorsión? » EsGeeks
|➨ Hablaremos de los ataques Ransom DDoS (RDDoS), cómo funcionan y cuál es la posible solución para prevenir este tipo de ataque. ✅
Escribir sobre una vulnerabilidad en ActiveX en 2021 no deja de ser curioso. Microsoft se ha visto obligado a publicar un aviso porque los atacantes ya la están aprovechando. Se explota a través de Office. El documento tiene la habilidad de usar MSHTML (algo del tipo mshtml:// que invoca al motor de Internet Explorer en Office) a través de un objeto OLE para ver contenido web y a partir de aquí lanza un ActiveX, que no es más que una funcionalidad ya antigua de Microsoft para ejecutar código en el contexto del navegador, pero que se mantiene internamente integrado en muchos aspectos del sistema operativo. Por supuesto la ejecución ocurre de forma transparente. El fichero HTML que trae el documento es un .CPL especialmente manipulado que finalmente ejecuta una DLL.
Se espera que puedan publicar un parche para la semana que viene. Mientras, la recomendación es desactivar ActiveX en todas las zonas de Internet Explorer.
Más info:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444
Se espera que puedan publicar un parche para la semana que viene. Mientras, la recomendación es desactivar ActiveX en todas las zonas de Internet Explorer.
Más info:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444
Nuevas vulnerabilidades graves en paquetes de Node.js
https://blog.segu-info.com.ar/2021/09/github-nuevas-vulnerabilidades-graves.html
https://blog.segu-info.com.ar/2021/09/github-nuevas-vulnerabilidades-graves.html
Segu-Info - Ciberseguridad desde 2000
Nuevas vulnerabilidades graves en paquetes de Node.js
Hi.
Buen día a todos espero estén bien.
El día de hoy he publicado un nuevo script nuevamente para Samba Relay pero está ves por IPV6 espero les sea de su agrado y si hay sugerencias serán bien recibidas.
Un saludo.
https://github.com/Anonimo501/SambaRelayIpv6
Buen día a todos espero estén bien.
El día de hoy he publicado un nuevo script nuevamente para Samba Relay pero está ves por IPV6 espero les sea de su agrado y si hay sugerencias serán bien recibidas.
Un saludo.
https://github.com/Anonimo501/SambaRelayIpv6
GitHub
GitHub - Anonimo501/SambaRelayIpv6
Contribute to Anonimo501/SambaRelayIpv6 development by creating an account on GitHub.
Comunidad Pen7esting pinned «Hi. Buen día a todos espero estén bien. El día de hoy he publicado un nuevo script nuevamente para Samba Relay pero está ves por IPV6 espero les sea de su agrado y si hay sugerencias serán bien recibidas. Un saludo. https://github.com/Anonimo501/SambaRelayIpv6»
Cisco IOS XR Software IP Service Level Agreements and Two-Way Active Measurement Protocol Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20XR%20Software%20IP%20Service%20Level%20Agreements%20%20and%20Two-Way%20Active%20Measurement%20Protocol%20Denial%20of%20Service%20Vulnerability&vs_k=1
A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition.
This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP
This advisory is part of the September 2021 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Cisco IOS XR Software Security Advisory Bundled Publication (https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74637).
Security Impact Rating: High
CVE: CVE-2021-34720
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20XR%20Software%20IP%20Service%20Level%20Agreements%20%20and%20Two-Way%20Active%20Measurement%20Protocol%20Denial%20of%20Service%20Vulnerability&vs_k=1
A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition.
This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP
This advisory is part of the September 2021 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Cisco IOS XR Software Security Advisory Bundled Publication (https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74637).
Security Impact Rating: High
CVE: CVE-2021-34720
Cisco
Cisco Security Advisory: Cisco IOS XR Software IP Service Level Agreements and Two-Way Active Measurement Protocol Denial of Service…
A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause…
📃 "Criptógrafos vulneran el protocolo de cifrado de Telegram" https://unaaldia.hispasec.com/2021/07/criptografos-vulneran-el-protocolo-de-cifrado-de-telegram.html
📃 "Cuatro vulnerabilidades críticas encontradas en la criptografía de Telegram" https://noticiasseguridad.com/vulnerabilidades/cuatro-vulnerabilidades-criticas-encontradas-en-la-criptografia-de-telegram/
📃 "Cuatro vulnerabilidades críticas encontradas en la criptografía de Telegram" https://noticiasseguridad.com/vulnerabilidades/cuatro-vulnerabilidades-criticas-encontradas-en-la-criptografia-de-telegram/
Una al Día
Criptógrafos vulneran el protocolo de cifrado de Telegram
Un grupo de criptógrafos internacionales descubrieron cuatro vulnerabilidades asociadas al protocolo de cifrado de Telegram.
Zero-Day crítico en MSHTML e incrustados en documentos de Microsoft Office (CVE-2021-40444)
https://blog.segu-info.com.ar/2021/09/zero-day-critico-en-mshtml-e.html
https://blog.segu-info.com.ar/2021/09/zero-day-critico-en-mshtml-e.html