[webapps] OpenBMCS 2.4 - SQLi (Authenticated)
OpenBMCS 2.4 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50668
OpenBMCS 2.4 - SQLi (Authenticated)
https://www.exploit-db.com/exploits/50668
Exploit Database
OpenBMCS 2.4 - SQLi (Authenticated)
OpenBMCS 2.4 - SQLi (Authenticated).. webapps exploit for PHP platform
[webapps] OpenBMCS 2.4 - Cross Site Request Forgery (CSRF)
OpenBMCS 2.4 - Cross Site Request Forgery (CSRF)
https://www.exploit-db.com/exploits/50667
OpenBMCS 2.4 - Cross Site Request Forgery (CSRF)
https://www.exploit-db.com/exploits/50667
Exploit Database
OpenBMCS 2.4 - Cross Site Request Forgery (CSRF)
OpenBMCS 2.4 - Cross Site Request Forgery (CSRF).. webapps exploit for PHP platform
📃 "Datos que se pueden obtener de las aplicaciones de mensajería cifradas" https://blog.segu-info.com.ar/2021/12/datos-que-se-pueden-obtener-de-las.html
Segu-Info - Ciberseguridad desde 2000
Datos que se pueden obtener de las aplicaciones de mensajería cifradas
Un ciberataque masivo deja inoperativos varios sitios webs del Gobierno de Ucrania
https://unaaldia.hispasec.com/2022/01/un-ciberataque-masivo-deja-inoperativos-varios-sitios-webs-del-gobierno-de-ucrania.html
https://unaaldia.hispasec.com/2022/01/un-ciberataque-masivo-deja-inoperativos-varios-sitios-webs-del-gobierno-de-ucrania.html
Una al Día
Un ciberataque masivo deja inoperativos varios sitios webs del Gobierno de Ucrania
El gobierno de Ucrania han recibido "un ciberataque masivo" con texto amenazante y alegan que su información personal ha sido pirateada.
Los NFTs y el registro mundial de los dueños de activos digitales en el Metaverso
http://www.elladodelmal.com/2022/01/los-nfts-y-el-registro-mundial-de-los.html
http://www.elladodelmal.com/2022/01/los-nfts-y-el-registro-mundial-de-los.html
Elladodelmal
Los NFTs y el registro mundial de los dueños de activos digitales en el Metaverso
Blog personal de Chema Alonso (CDO Telefónica, 0xWord, MyPublicInbox, Singularity Hackers) sobre seguridad, hacking, hackers y Cálico Electrónico.
[webapps] OpenBMCS 2.4 - Create Admin / Remote Privilege Escalation
OpenBMCS 2.4 - Create Admin / Remote Privilege Escalation
https://www.exploit-db.com/exploits/50669
OpenBMCS 2.4 - Create Admin / Remote Privilege Escalation
https://www.exploit-db.com/exploits/50669
Exploit Database
OpenBMCS 2.4 - Create Admin / Remote Privilege Escalation
OpenBMCS 2.4 - Create Admin / Remote Privilege Escalation.. webapps exploit for PHP platform
Medios de comunicación noruegos son hackeados https://unaaldia.hispasec.com/2022/01/medios-de-comunicacion-noruegos-son-hackeados.html
Una al Día
Medios de comunicación noruegos son hackeados
Los datos personales de clientes podrían haberse filtrado tras un ciberataque a un medio de comunicación noruego.
Multiple Cisco Products Snort Modbus Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Multiple%20Cisco%20Products%20Snort%20Modbus%20Denial%20of%20Service%20Vulnerability&vs_k=1
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj
Security Impact Rating: High
CVE: CVE-2022-20685
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Multiple%20Cisco%20Products%20Snort%20Modbus%20Denial%20of%20Service%20Vulnerability&vs_k=1
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj
Security Impact Rating: High
CVE: CVE-2022-20685
Cisco
Cisco Security Advisory: Multiple Cisco Products Snort Modbus Denial of Service Vulnerability
A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing…
This vulnerability is due to an integer overflow while processing…
[webapps] Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)
Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50677
Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)
https://www.exploit-db.com/exploits/50677
Exploit Database
Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS)
Rocket LMS 1.1 - Persistent Cross Site Scripting (XSS).. webapps exploit for PHP platform
VMSA-2021-0028.9
CVSSv3 Range:9.0-10.0
Issue Date:2021-12-10
Updated On:2022-01-19
CVE(s): CVE-2021-44228, CVE-2021-45046
Synopsis:
VMware Response to Apache Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046)
https://www.vmware.com/security/advisories/VMSA-2021-0028.html
CVSSv3 Range:9.0-10.0
Issue Date:2021-12-10
Updated On:2022-01-19
CVE(s): CVE-2021-44228, CVE-2021-45046
Synopsis:
VMware Response to Apache Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046)
https://www.vmware.com/security/advisories/VMSA-2021-0028.html
“IndexedDB Leaks” la nueva vulnerabilidad en Safari
https://unaaldia.hispasec.com/2022/01/indexeddb-leaks-la-nueva-vulnerabilidad-en-safari.html
https://unaaldia.hispasec.com/2022/01/indexeddb-leaks-la-nueva-vulnerabilidad-en-safari.html
Una al Día
“IndexedDB Leaks” la nueva vulnerabilidad en Safari
Se ha publicado una nueva vulnerabilidad en IndexesDB que afecta al navegador Safari la cual ha sido denominada como “IndexedDB Leaks”.
📃 "Mejores distribuciones de Linux para hacking ético" https://blog.elhacker.net/2021/11/mejores-distribuciones-de-linux-para-hacking-etico-pentest.html
🛠 Kali Linux (Debian)
🛠 ArchStrike (ex ArchAssault)
🛠 BackArch (Arch)
🛠 Demon Linux (Debian)
🛠 BackBox (Ubuntu)
🛠 Parrot OS (Debian)
🛠 CAINE
🛠 Pentoo
🛠 Network Security (NST, Debian)
🛠 Samurai Web Training Framework OWASP (OVA)
🛠 Cyborg Hawk
🛠 Kali Linux (Debian)
🛠 ArchStrike (ex ArchAssault)
🛠 BackArch (Arch)
🛠 Demon Linux (Debian)
🛠 BackBox (Ubuntu)
🛠 Parrot OS (Debian)
🛠 CAINE
🛠 Pentoo
🛠 Network Security (NST, Debian)
🛠 Samurai Web Training Framework OWASP (OVA)
🛠 Cyborg Hawk
Blog elhacker.NET
Mejores distribuciones de Linux para hacking ético
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
Vulnerabilidad crítica en plugins WordPress
https://unaaldia.hispasec.com/2022/01/vulnerabilidad-critica-en-plugins-wordpress.html
https://unaaldia.hispasec.com/2022/01/vulnerabilidad-critica-en-plugins-wordpress.html
Una al Día
Vulnerabilidad crítica en plugins WordPress
Publicada una deficiencia de seguridad en tres complementos para WordPress que podrían afectar a más de 84.000 sitios webs.
Nueva vulnerabilidad en SolarWinds es utilizada para aprovechar fallas de Log4j
https://blog.segu-info.com.ar/2022/01/nueva-vulnerabilidad-en-solarwinds-es.html
https://blog.segu-info.com.ar/2022/01/nueva-vulnerabilidad-en-solarwinds-es.html