Vulnerabilities

Attacco Magecart Hacker Giacomo Lanzi

Magecart attack: what it is and how to protect yourself

Every day we hear about some new technology threats or vulnerabilities. Lately we talk about the data collection attack known as “Magecart”. Let’s try to understand what it is and how we can do to defend ourselves. Magecart is a large group of hackers as well as a typical attack that mainly targets online shopping carts. This type of attack…

WastedLocker Ransomware Giacomo Lanzi

WastedLocker: Next generation ransomware

WastedLocker is ransomware attack software that began targeting businesses and other organizations in May 2020. It is known for its high ransom demands reaching millions of dollars per victim. It is the product of a group of highly skilled cyber criminals who have been operating for over a decade: Evil Corp. Who is behind WastedLocker Ransomware The group behind WastedLocker…

Standard ISO 27001 Giacomo Lanzi

Does ISO 27001 standard require a Pentest?

A legitimate question that often arises is whether the Penetration Test is necessary for compliance with the ISO 27001 standard. To fully understand the answer, it is necessary to clarify what is meant by these terms and to understand the relationship between all the components of the certification. ISO 27001 standard A technical standard, also incorrectly called a standard, is…

Piergiorgio Venuti

Path traversal in Photo Gallery (WordPress plugin)

Path traversal in Photo Gallery may allow admins to read most files on the filesystem (WordPress plugin)

Piergiorgio Venuti

CVE-2017-7620 Mantis Bug Tracker

CVE-2017-7620 Mantis Bug Tracker 1.3.10 / v2.3.0 CSRF Permalink Injection

Piergiorgio Venuti

WordPress Newsletter Supsystic 1.1.7

WordPress Newsletter Supsystic 1.1.7 – Cross Site Scripting Vulnerability

Piergiorgio Venuti

[CVE-2017-5868] OpenVPN Access Server

[CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation

Piergiorgio Venuti

Linux Kernel Privilege Escalation

SSD Advisory – Linux Kernel XFRM Privilege Escalation

Piergiorgio Venuti

SSD Advisory – Linux Kernel AF_PACKET Use-After-Free

Piergiorgio Venuti

SSD Advisory – Webmin Multiple Vulnerabilities

Piergiorgio Venuti

SSD Advisory – PHP Melody Multiple Vulnerabilities

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Ad Widget Plugin Local File Inclusion Security Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Simple Login Log Plugin Multiple SQL Injection Security Vulnerabilities

Piergiorgio Venuti

WordPress does not hash or expire wp_signups.activation_key allowing an attacker with SQL injection to create accounts

Piergiorgio Venuti

DefenseCode Security Advisory: Magento Commerce CSRF, Stored Cross Site Scripting #1

Piergiorgio Venuti

Exploit toolkit for CVE-2017-8759 – Microsoft .NET Framework RCE (Builder + listener + video tutorial)

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress PressForward Plugin Security Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Podlove Podcast Publisher Plugin Security Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Easy Modal Plugin Multiple Security Vulnerabilities

Piergiorgio Venuti

Stop User Enumeration allows user enumeration via the REST API (WordPress plugin)

Piergiorgio Venuti

Defense in depth — the Microsoft way (part 48): privilege escalation for dummies — they didn’t make SUCH a stupid blunder?

Piergiorgio Venuti

Multiple Local Privilege Escalation Vulnerabilities in Acunetix Web Vulnerability Scanner 11

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress AffiliateWP Plugin Security Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Huge-IT Video Gallery Plugin Security Vulnerability

Piergiorgio Venuti

Joomla com_tag v1.7.6 – (tag) SQL Injection Vulnerability

Piergiorgio Venuti

Qualys Security Advisory – CVE-2017-1000367 in Sudo’s get_process_ttyname() for Linux

Piergiorgio Venuti

Defense in depth — the Microsoft way (part 48): privilege escalation for dummies — they didn’t make SUCH a stupid blunder?

Piergiorgio Venuti

Microsoft Dynamic CRM 2016 – Cross-Site Scripting vulnerability

Piergiorgio Venuti

Executable installers are vulnerable^WEVIL (case 52): escalation of privilege with Microsoft’s .NET Framework installers

Piergiorgio Venuti

Reflected XSS in WordPress Download Manager could allow an attacker to do almost anything an admin can (WordPress plugin)

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress All In One Schema.org Rich Snippets Plugin Security Vulnerability

Piergiorgio Venuti

[CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation

Piergiorgio Venuti

Stealing Windows Credentials Using Google Chrome

Piergiorgio Venuti

WordPress EELV Newsletter v4.5 – Multiple Vulnerabilities

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: GOOGLE google-api-php-client Multiple Security Vulnerabilities

Piergiorgio Venuti

DefenseCode WebScanner DAST Advisory: WordPress User Access Manager Plugin Security Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Tracking Code Manager Plugin Multiple Security Vulnerabilities

Piergiorgio Venuti

CSRF in wordpress plugin clean login allows remote attacker change wordpress login redirect url or logout redirect url to evil address

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress WebDorado Gallery Plugin SQL Injection Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Spider Event Calendar Plugin SQL Injection Vulnerability

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Facebook Plugin SQL Injection Vulnerability

Alessandro Stesi

Cross-Site Scripting vulnerability in Trust Form WordPress Plugin

Alessandro Stesi

Cross-Site Scripting vulnerability in WP-SpamFree Anti-Spam WordPress Plugin

Piergiorgio Venuti

Popup by Supsystic WordPress plugin vulnerable to Cross-Site Request Forgery

Piergiorgio Venuti

Stored Cross-Site Scripting vulnerability in User Login Log WordPress Plugin

Piergiorgio Venuti

Cross-Site Request Forgery & Cross-Site Scripting in Contact Form Manager WordPress Plugin

Piergiorgio Venuti

Stored Cross-Site Scripting vulnerability in Contact Form WordPress Plugin

Piergiorgio Venuti

Remote file upload vulnerability in WordPress Plugin Mobile App Native 3.0

Piergiorgio Venuti

Cross-Site Request Forgery in WordPress Press This function allows DoS

Alessandro Stesi

Persistent Cross-Site Scripting in the WordPress NewStatPress plugin

Alessandro Stesi

Cross-Site Request Forgery in Atahualpa WordPress Theme

Alessandro Stesi

Cross-Site Scripting in Magic Fields 1 WordPress Plugin

Alessandro Stesi

Cross-Site Scripting in Google Analytics Dashboard WordPress Plugin

Alessandro Stesi

WordPress Adminer plugin allows public (local) database login

Alessandro Stesi

Cross-Site Request Forgery in WordPress Download Manager Plugin

Alessandro Stesi

Simple Ads Manager WordPress plugin unauthenticated PHP Object injection vulnerability

Alessandro Stesi

Cross-Site Request Forgery in Global Content Blocks WordPress Plugin

Alessandro Stesi

Cross-Site Request Forgery in File Manager WordPress plugin

Alessandro Stesi

Cross-Site Scripting vulnerability in WP-Filebase Download Manager WordPress Plugin

Alessandro Stesi

Admin Custom Login WordPress plugin custom login page affected by persistent Cross-Site Scripting

Alessandro Stesi

Admin Custom Login WordPress plugin affected by persistent Cross-Site Scripting via Logo URL field

Alessandro Stesi

Analytics Stats Counter Statistics WordPress Plugin unauthenticated PHP Object injection vulnerability

Alessandro Stesi

WordPress Plugin Kama Click Counter 3.4.9 – Blind SQL Injection

Alessandro Stesi

WordPress Plugin Easy Table 1.6 – Persistent Cross-Site Scripting

Alessandro Stesi

Persistent Cross-Site Scripting vulnerability in User Access Manager WordPress Plugin

Alessandro Stesi

Multiple blind SQL injection vulnerabilities in FormBuilder WordPress Plugin

Alessandro Stesi

Cross-Site Request Forgery vulnerability in FormBuilder WordPress Plugin allows plugin permissions modification

Alessandro Stesi

CMS Commander Client WordPress Plugin unauthenticated PHP Object injection vulnerability

Alessandro Stesi

Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

Alessandro Stesi

New exploit for new vulnerability in WordPress Plugin + tutorial

Alessandro Stesi

Nginx (Debian-based + Gentoo distros) – Root Privilege Escalation [CVE-2016-1247 UPDATE]

Alessandro Stesi

Multiple vulnerabilities in cPanel <= 60.0.34

Alessandro Stesi

Stop User Enumeration does not stop user enumeration (WordPress plugin)

Alessandro Stesi

Zend Framework / zend-mail < 2.4.11 Remote Code Execution (CVE-2016-10034)

Piergiorgio Venuti

MySQL / MariaDB / PerconaDB – Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]

Piergiorgio Venuti

Cross-Site Scripting in Check Email WordPress Plugin

Piergiorgio Venuti

Cross-Site Scripting in All In One WP Security & Firewall WordPress Plugin

Piergiorgio Venuti

Nginx (Debian-based distros) – Root Privilege Escalation Vulnerability (CVE-2016-1247)

Piergiorgio Venuti

Stored Cross-Site Scripting vulnerability in 404 to 301 WordPress Plugin

Piergiorgio Venuti

Cross-Site Scripting in Calendar WordPress Plugin

Piergiorgio Venuti

Cross-Site Scripting vulnerability in Caldera Forms WordPress Plugin

Piergiorgio Venuti

Cross-Site Scripting vulnerability in Quotes Collection WordPress Plugin

Piergiorgio Venuti

MySQL / MariaDB / PerconaDB – Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )

Piergiorgio Venuti

[oss-security] CVE request:Lynx invalid URL parsing with ‘?’

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading

RSS Full Disclosure

  • Defense in depth -- the Microsoft way (part 83): instead to fix even their most stupid mistaskes, they spill barrels of snakeoil to cover them (or just leave them as-is) March 17, 2023
    Posted by Stefan Kanthak on Mar 16Hi @ll, with Windows 2000, Microsoft virtualised the [HKEY_CLASSES_ROOT] registry branch: what was just an alias for [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] before became the overlay of [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] and [HKEY_CURRENT_USER\Software\Classes] with the latter having precedence: Note: while [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] is writable only by...
  • [CFP] Security BSides Ljubljana 0x7E7 | June 16, 2023 March 17, 2023
    Posted by Andraz Sraka on Mar 16MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM...
  • Full Disclosure - Fastly March 12, 2023
    Posted by Andrey Stoykov on Mar 11Correspondence from Fastly declined to comment regarding new discovered vulnerabilities within their website. Poor practices regarding password changes. 1. Reset user password 2. Access link sent 3. Temporary password sent plaintext // HTTP POST request POST /user/mwebsec%40gmail.com/password/request_reset HTTP/2 Host: api.fastly.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 […]
  • Full Disclosure - Shopify Application March 12, 2023
    Posted by Andrey Stoykov on Mar 11Correspondence from Shopify declined to comment regarding new discovered vulnerabilities within their website. Although &apos;frontend&apos; vulnerabilities are considered out of scope, person/tester foundhimself a beefy bugbounty from the same page that has been listed below, including similar functionality that has not been tested yet. Two emails and several reports, […]
  • [CVE-2023-25355/25356] No fix available - vulnerabilities in CoreDial sipXcom sipXopenfire March 7, 2023
    Posted by Systems Research Group via Fulldisclosure on Mar 06
  • SEC Consult SA-20230306-0 :: Multiple Vulnerabilities in Arris DG3450 Cable Gateway March 7, 2023
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Mar 06SEC Consult Vulnerability Lab Security Advisory < 20230306-0 > ======================================================================= title: Multiple Vulnerabilities product: Arris DG3450 Cable Gateway vulnerable version: AR01.02.056.18_041520_711.NCS.10 fixed version: - CVE number: CVE-2023-27571, CVE-2023-27572 impact: medium homepage: https://www.commscope.com...
  • OpenBSD overflow March 7, 2023
    Posted by Erg Noor on Mar 06Hi, Fun OpenBSD bug. ip_dooptions() will allow IPOPT_SSRR with optlen = 2. save_rte() will set isr_nhops to very large value, which will cause overflow in next ip_srcroute() call. More info is here https://github.com/fuzzingrf/openbsd_tcpip_overflow/ -erg
  • SEC Consult SA-20230228-0 :: OS Command Injectionin Barracuda CloudGen WAN March 3, 2023
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Mar 02SEC Consult Vulnerability Lab Security Advisory < 20230228-0 > ======================================================================= title: OS Command Injection product: Barracuda CloudGen WAN vulnerable version: < v8.* hotfix 1089 fixed version: v8.* with hotfix webui-sdwan-1089-8.3.1-174141891 or above version 9.0.0 or above CVE number: CVE-2023-26213...
  • SRP on Windows 11 March 3, 2023
    Posted by Andy Ful on Mar 02The correction to: Full Disclosure: Defense in depth -- the Microsoft way (part 82): INVALID/BOGUS AppLocker rules disable SAFER on Windows 11 22H2 (seclists.org) The Kanthak correction to restore SRP functionality on Windows 11 ver. 22H2, works only when Smart App Control is OFF. If it is in Evaluate […]
  • NetBSD overflow March 3, 2023
    Posted by Erg Noor on Mar 02Hi, Trivial overflow in hfslib_reada_node_offset, while loop has no range checks. |size_t hfslib_reada_node_offsets(void* in_bytes, uint16_t* out_offset_array) { void* ptr; if (in_bytes == NULL || out_offset_array == NULL) return 0; ptr = in_bytes; out_offset_array--; do { out_offset_array++; *out_offset_array = be16tohp(&ptr); } while (*out_offset_array != (uint16_t)14); return ((uint8_t*)ptr - (uint8_t*)in_bytes); }| […]

Customers

Newsletter