Sapsi Consultores

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • FalconGate – A smart gateway to stop hackers and Malware attacks

    FalconGate – A smart gateway to stop hackers and Malware attacks A smart gateway to stop hackers, Malware and more… Motivation Cyber attacks are on the raise. Hacker and cyber criminals are continuously improving their methods and building new tools and Malware with the purpose of hacking your network, spying on you and stealing valuable […] The post FalconGate – A smart gateway to stop hackers an...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Mazain, un nuevo troyano bancario y su botnet asociada (y II)

    Mazain, un nuevo troyano bancario y su botnet asociada (y II) En la una-al-día de ayer describimos el comportamiento de Mazain, una nueva muestra de malware para Android que hemos encontrado en nuestro Departamento Antifraude. Tal y como adelantamos, en la noticia de hoy vamos a analizar el C&C, las campañas, las diferentes muestras, las […] The post Mazain, un nuevo troyano bancario y su botnet a...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Faraday v2.4 – Collaborative Penetration Test and Vulnerability Management Platform

    Faraday v2.4 – Collaborative Penetration Test and Vulnerability Management Platform Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard for CISOs and managers uncovers the impact and risk being assessed by the audit in […] The post Faraday v2.4 – Col...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Mazain, un nuevo troyano bancario y su botnet asociada (I)

    Mazain, un nuevo troyano bancario y su botnet asociada (I) El malware para Android crece más cada día, además se vuelve más peligroso y con un objetivo concreto: nuestro dinero. Hemos encontrado un nuevo troyano bancario para Android del que además hemos podido acceder al panel de la botnet que lo controla. Nos hemos encontrado en […] The post Mazain, un nuevo troyano bancario y su botnet asociada...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Mozilla corrige la vulnerabilidad del Pwn2Own

    Mozilla corrige la vulnerabilidad del Pwn2Own Mozilla ha publicado un boletín de seguridad (del MFSA 2017-08) destinado a corregir la vulnerabilidad crítica que afecta a sus navegadores web Firefox y Firefox ESR anunciada en el concurso Pwn2Own. Como ya describimos en nuestra crónica del concurso Pwn2Own el equipo Chaitin Security Research Lab (@ChaitinTech) consiguió un […] The post Mozilla corri...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • ooniprobe – Measure Internet Censorship & Speed

    ooniprobe – Measure Internet Censorship & Speed Interested in collecting evidence of Internet censorship? Curious about the speed and performance of the network that you are using? By running the tests in this app, you will examine the following: Blocking of websites  Presence of systems that could be responsible for censorship and/or surveillance Speed and […] The post ooniprobe – Measure Interne...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades

    Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades A pesar de las informacionesprevias sobre la no publicación de boletines, este martes Microsoft ha publicado 18 boletines de seguridad (del MS17-006 al MS17-023) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft nueve de los boletines presentan un nivel de […] The post Mic...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades

    Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades A pesar de las informacionesprevias sobre la no publicación de boletines, este martes Microsoft ha publicado 18 boletines de seguridad (del MS17-006 al MS17-023) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft nueve de los boletines presentan un nivel de […] The post Mic...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades

    Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades A pesar de las informacionesprevias sobre la no publicación de boletines, este martes Microsoft ha publicado 18 boletines de seguridad (del MS17-006 al MS17-023) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft nueve de los boletines presentan un nivel de […] The post Mic...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades

    Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades A pesar de las informacionesprevias sobre la no publicación de boletines, este martes Microsoft ha publicado 18 boletines de seguridad (del MS17-006 al MS17-023) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft nueve de los boletines presentan un nivel de […] The post Mic...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades

    Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades A pesar de las informacionesprevias sobre la no publicación de boletines, este martes Microsoft ha publicado 18 boletines de seguridad (del MS17-006 al MS17-023) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft nueve de los boletines presentan un nivel de […] The post Mic...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades

    Microsoft publica 18 boletines de seguridad y soluciona 135 vulnerabilidades A pesar de las informacionesprevias sobre la no publicación de boletines, este martes Microsoft ha publicado 18 boletines de seguridad (del MS17-006 al MS17-023) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft nueve de los boletines presentan un nivel de […] The post Mic...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • kimi – Script To Generate Malicious Debian Packages (Debian Trojans)

    kimi – Script To Generate Malicious Debian Packages (Debian Trojans) Script to generate malicious debian packages (debain trojans). Kimi is name inspired from “Kimimaro” one of my favriote charater from anime called “Naruto”. Kimi is a script which generates Malicious debian package for metasploit which consists of bash file. the bash file is deployed into […] The post kimi – Script To Generate Ma...

  • [webapps] – Php Classified OLX Clone Script – ‘category’ Parameter SQL Injection

    [webapps] – Php Classified OLX Clone Script – ‘category’ Parameter SQL Injection Php Classified OLX Clone Script – ‘category’ Parameter SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Php Classified OLX Clone Script – ‘category’ Parameter SQL Injection appeared first on Sapsi Security Services.

  • Múltiples vulnerabilidades en Trend Micro InterScan Web Security Virtual Appliance

    Múltiples vulnerabilidades en Trend Micro InterScan Web Security Virtual Appliance Trend Micro ha publicadouna nueva versión de Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5, destinada a resolver diversas vulnerabilidades que podrían llegar a permitir a un atacante remoto ejecutar código arbitrario en los sistemas afectados.    Un usuario remoto autenticado podría enviar una […]...

  • RogueSploit – Powerfull social engeering Wi-Fi trap!

    RogueSploit – Powerfull social engeering Wi-Fi trap! RogueSploit is an open source automated script made to create a Fake Acces Point, with dhcpd server, dns spoofing, host redirection, browser_autopwn1 or autopwn2 or beef+mitmf. TO DO LIST: Add BeEF;[DONE] Add MITMF;[DONE] Add BDFProxy; Add SeToolkit; Add Hostapd as fake ap; Add some features; What you need: […] The post RogueSploit – Powerfull s...

  • ZDI-17-132: Trend Micro SafeSync for Enterprise displayName_get SQL Injection Information Disclosure Vulnerability

    ZDI-17-132: Trend Micro SafeSync for Enterprise displayName_get SQL Injection Information Disclosure Vulnerability This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro SafeSync for Enterprise. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. http://feeds.feedb...

  • ZDI-17-131: Trend Micro SafeSync for Enterprise count_ad_members SQL Injection Information Disclosure Vulnerability

    ZDI-17-131: Trend Micro SafeSync for Enterprise count_ad_members SQL Injection Information Disclosure Vulnerability This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro SafeSync for Enterprise. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. http://feeds.feed...

  • ZDI-17-130: Trend Micro SafeSync for Enterprise restartService Command Injection Remote Code Execution Vulnerability

    ZDI-17-130: Trend Micro SafeSync for Enterprise restartService Command Injection Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro SafeSync for Enterprise. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. http://feeds.feedburner....

  • [webapps] – DLink DSL-2730U Wireless N 150 – Cross-Site Request Forgery

    [webapps] – DLink DSL-2730U Wireless N 150 – Cross-Site Request Forgery DLink DSL-2730U Wireless N 150 – Cross-Site Request Forgery http://www.exploit-db.com/rss.xml The post [webapps] – DLink DSL-2730U Wireless N 150 – Cross-Site Request Forgery appeared first on Sapsi Security Services.

  • Botnet IRC ataca a entidades colombianas.

    Botnet IRC ataca a entidades colombianas. Recientemente el Departamento Antifraude de Hispasec se ha encontrado con una muestra de malware que afecta a entidades colombianas, y que intenta afectar a los usuarios a través de un falso email de factura. Si has recibido un e-mail como se muestra anteriormente, y además has ejecutado el binario […] The post Botnet IRC ataca a entidades colombianas. app...

  • OverThruster – HID Attack Payload Generator For Arduinos

    OverThruster – HID Attack Payload Generator For Arduinos OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip, like the CJMCU-BEETLE, or the new LilyGo “BadUSB” devices popping up on ebay and aliexpress that look like USB sticks but contain an […] The post OverThruster – HID Attack Payload Generator For Arduino...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Vulnerabilidad en el kernel de Linux desde hace más de 11 años

    Vulnerabilidad en el kernel de Linux desde hace más de 11 años Se ha anunciado la existencia de una vulnerabilidad en el kernel de Linux que podría permitir a usuarios locales obtener privilegios de root y que todo indica que existíadesde hace más de 11 años. Las principales distribuciones ya disponen de actualizaciones. El fallo, […] The post Vulnerabilidad en el kernel de Linux desde hace más de...

  • Lynis 2.4.3 – Security Auditing Tool for Unix/Linux Systems

    Lynis 2.4.3 – Security Auditing Tool for Unix/Linux Systems We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made. There is a risk of breaking your existing configuration. Lynis is an open […] The post Lynis 2.4.3 – Security Auditing Tool for Unix/Linux S...

  • [shellcode] – Linux/x86-64 – Egghunter Shellcode (38 bytes)

    [shellcode] – Linux/x86-64 – Egghunter Shellcode (38 bytes) Linux/x86-64 – Egghunter Shellcode (38 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux/x86-64 – Egghunter Shellcode (38 bytes) appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Store for K2 3.8.2 – SQL Injection

    [webapps] – Joomla! Component Store for K2 3.8.2 – SQL Injection Joomla! Component Store for K2 3.8.2 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Store for K2 3.8.2 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component UserExtranet 1.3.1 – SQL Injection

    [webapps] – Joomla! Component UserExtranet 1.3.1 – SQL Injection Joomla! Component UserExtranet 1.3.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component UserExtranet 1.3.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component MultiTier 3.1 – SQL Injection

    [webapps] – Joomla! Component MultiTier 3.1 – SQL Injection Joomla! Component MultiTier 3.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component MultiTier 3.1 – SQL Injection appeared first on Sapsi Security Services.

  • Microsoft publica actualización, pero solo para Flash

    Microsoft publica actualización, pero solo para Flash Una semana después de informar que este mes no habría actualizaciones de seguridad, Microsoft ha publicado un boletín (el MS17-005) para solucionar únicamente las vulnerabilidades relativas a Flash Player. Aunque Microsoft había anunciado que no publicaría más boletines en el formato habitual, una semana después de la fecha […] The post Microso...

  • mongoaudit – A Powerful MongoDB Auditing and Pentesting Tool

    mongoaudit – A Powerful MongoDB Auditing and Pentesting Tool mongoaudit is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing. Installing with pip This is the recommended installation method in case you have python and pip . pip install mongoaudit Alternative installer Use this if and only if […] The post mongoaudit – A Powerful M...

  • [dos] – EasyCom For PHP 4.0.0 – Buffer Overflow (PoC)

    [dos] – EasyCom For PHP 4.0.0 – Buffer Overflow (PoC) EasyCom For PHP 4.0.0 – Buffer Overflow (PoC) http://www.exploit-db.com/rss.xml The post [dos] – EasyCom For PHP 4.0.0 – Buffer Overflow (PoC) appeared first on Sapsi Security Services.

  • [dos] – EasyCom For PHP 4.0.0 – Denial of Service

    [dos] – EasyCom For PHP 4.0.0 – Denial of Service EasyCom For PHP 4.0.0 – Denial of Service http://www.exploit-db.com/rss.xml The post [dos] – EasyCom For PHP 4.0.0 – Denial of Service appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Microsoft retrasa sus parches de febrero hasta el 14 de marzo

    Microsoft retrasa sus parches de febrero hasta el 14 de marzo En una decisión sin precedentes, Microsoft ha anunciadoque la publicación del paquete de actualizaciones planificadas para este pasado martes 14 de febrero se retrasa hasta el próximo 14 de marzo (segundo martes del mes). Problemas de última hora sin confirmar han obligado a la […] The post Microsoft retrasa sus parches de febrero hasta...

  • MalQR – Collection of malicious QR Codes and Barcodes you can use to test the security of your scanners

    MalQR – Collection of malicious QR Codes and Barcodes you can use to test the security of your scanners MalQR is a collection of malicious QR codes and barcodes you can use to test the security of your scanners. It gives you the ability to conduct such tests with easiness : you just need to […] The post MalQR – Collection of malicious QR Codes and Barcodes you can use to test the security of your ...

  • [webapps] – Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection

    [webapps] – Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection

    [webapps] – Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Spider Facebook 1.6.1 – SQL Injection

    [webapps] – Joomla! Component Spider Facebook 1.6.1 – SQL Injection Joomla! Component Spider Facebook 1.6.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider Facebook 1.6.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection

    [webapps] – Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection appeared first on Sapsi Security Services.

  • [shellcode] – Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes)

    [shellcode] – Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes) Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes) appeared first on Sapsi Security Services.

  • [webapps] – WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting

    [webapps] – WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting http://www.exploit-db.com/rss.xml The post [webapps] – WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting appeared first on Sapsi Security Services.

  • [webapps] – dotCMS 3.6.1 – Blind Boolean SQL Injection

    [webapps] – dotCMS 3.6.1 – Blind Boolean SQL Injection dotCMS 3.6.1 – Blind Boolean SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – dotCMS 3.6.1 – Blind Boolean SQL Injection appeared first on Sapsi Security Services.

  • Apple publica una nueva actualización de seguridad para GarageBand

    Apple publica una nueva actualización de seguridad para GarageBand Hace menos de un mes Apple publicó una actualización de seguridad para GarageBand (su popular programa de composición musical) para OS X, destinada a solucionar un fallo que podía permitir la ejecución remota de código. Lamentablemente el problema no quedó totalmente solucionado, y se hace necesaria […] The post Apple publica una n...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • [webapps] – Mobiketa 3.5 – SQL Injection

    [webapps] – Mobiketa 3.5 – SQL Injection Mobiketa 3.5 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Mobiketa 3.5 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Sendroid 5.2 – SQL Injection

    [webapps] – Sendroid 5.2 – SQL Injection Sendroid 5.2 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Sendroid 5.2 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Fome SMS Portal 2.0 – SQL Injection

    [webapps] – Fome SMS Portal 2.0 – SQL Injection Fome SMS Portal 2.0 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Fome SMS Portal 2.0 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – SOA School Management – SQL Injection

    [webapps] – SOA School Management – SQL Injection SOA School Management – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – SOA School Management – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Client Expert 1.0.1 – SQL Injection

    [webapps] – Client Expert 1.0.1 – SQL Injection Client Expert 1.0.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Client Expert 1.0.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Client Expert 1.0.1 – SQL Injection

    [webapps] – Client Expert 1.0.1 – SQL Injection Client Expert 1.0.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Client Expert 1.0.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – EXAMPLO – SQL Injection

    [webapps] – EXAMPLO – SQL Injection EXAMPLO – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – EXAMPLO – SQL Injection appeared first on Sapsi Security Services.

  • Google soluciona 58 vulnerabilidades en Android

    Google soluciona 58 vulnerabilidades en Android Google ha publicado el boletín de seguridad Androidcorrespondiente al mes de febrero en el que corrige un total de 58 vulnerabilidades, 10 de ellas calificadas como críticas. Como es habitual, Google divide las vulnerabilidades corregidas en dos bloques principales en función de los componentes afectados. En el nivel de […] The post Google soluciona ...

  • Smith – A Very Quick And Very Dirty Client/Server Tool For Testing Firewalls

    Smith – A Very Quick And Very Dirty Client/Server Tool For Testing Firewalls A client/server style agent meant for testing connectivity to and from a machine on a network. Installation python setup.py install or pip install . should install smith. Note: If you want to use the tcp/udp protocol options, you’ll need to install scapy […] The post Smith – A Very Quick And Very Dirty Client/Server Tool ...

  • [shellcode] – Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes)

    [shellcode] – Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes) Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes) appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • [dos] – Apple WebKit – ‘HTMLKeygenElement’ Type Confusion

    [dos] – Apple WebKit – ‘HTMLKeygenElement’ Type Confusion Apple WebKit – ‘HTMLKeygenElement’ Type Confusion http://www.exploit-db.com/rss.xml The post [dos] – Apple WebKit – ‘HTMLKeygenElement’ Type Confusion appeared first on Sapsi Security Services.

  • [shellcode] – Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes)

    [shellcode] – Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes) Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes) appeared first on Sapsi Security Services.

  • [local] – Ghostscript 9.20 – ‘Filename’ Command Execution

    [local] – Ghostscript 9.20 – ‘Filename’ Command Execution Ghostscript 9.20 – ‘Filename’ Command Execution http://www.exploit-db.com/rss.xml The post [local] – Ghostscript 9.20 – ‘Filename’ Command Execution appeared first on Sapsi Security Services.

  • [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC)

    [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC) WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC) http://www.exploit-db.com/rss.xml The post [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC) appeared first on Sapsi Security Services.

  • [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution

    [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution http://www.exploit-db.com/rss.xml The post [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution appeared first on Sapsi Security Services.

  • Routers Netgear pueden permitir acceder a la clave de administrador

    Routers Netgear pueden permitir acceder a la clave de administrador Un investigador de Trustwave ha anunciado una vulnerabilidad que afecta a múltiples modelos de routers Netgear y que podría permitir conseguir de una forma sencilla la contraseña de administrador de la interfaz web del dispositivo. El problema, descubierto por Simon Kenin de Trustwave, podría permitir […] The post Routers Netgear ...

  • Faraday v2.3 – Collaborative Penetration Test and Vulnerability Management Platform

    Faraday v2.3 – Collaborative Penetration Test and Vulnerability Management Platform Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard for CISOs and managers uncovers the impact and risk being assessed by the audit in […] The post Faraday v2.3 – Col...

  • [webapps] – LogoStore – ‘query’ Parameter SQL Injection

    [webapps] – LogoStore – ‘query’ Parameter SQL Injection LogoStore – ‘query’ Parameter SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – LogoStore – ‘query’ Parameter SQL Injection appeared first on Sapsi Security Services.

  • [dos] – Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free

    [dos] – Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free http://www.exploit-db.com/rss.xml The post [dos] – Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free appeared first on Sapsi Security Services.

  • [dos] – Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion

    [dos] – Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion http://www.exploit-db.com/rss.xml The post [dos] – Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 6 months ago

New blog articles detected

  • Nuevas versiones de BIND 9

    Nuevas versiones de BIND 9 ISC ha publicado nuevas versiones del servidor DNS BIND 9, destinadas a solucionar una vulnerabilidad considerada crítica que podría causar condiciones de denegación de servicioa través de consultas especialmente manipuladas. El servidor de nombres BIND es uno de los más usados en Internet. Creado en 1988, en la universidad de […] The post Nuevas versiones de BIND 9 appe...

  • Droid-Hunter – Android Application Vulnerability Analysis And Android Pentest Tool

    Droid-Hunter – Android Application Vulnerability Analysis And Android Pentest Tool .---. .----------- / \ __ / ------ / / \( )/ ----- ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗ ////// ' \/ ` --- ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝ //// / // : : --- ═╩╝╩╚═╚═╝╩═╩╝ ╩ ╩╚═╝╝╚╝ ╩ ╚═╝╩╚═ // / / /` '-- By […] The post Droid-Hunter – Android Application Vulnerability Analysis And Android Pentest Tool appeared first on...

  • [dos] – VLC Media Player 2.2.1 – Buffer Overflow

    [dos] – VLC Media Player 2.2.1 – Buffer Overflow VLC Media Player 2.2.1 – Buffer Overflow http://www.exploit-db.com/rss.xml The post [dos] – VLC Media Player 2.2.1 – Buffer Overflow appeared first on Sapsi Security Services.

  • [webapps] – Symantec Messaging Gateway 10.6.1 – Directory Traversal

    [webapps] – Symantec Messaging Gateway 10.6.1 – Directory Traversal Symantec Messaging Gateway 10.6.1 – Directory Traversal http://www.exploit-db.com/rss.xml The post [webapps] – Symantec Messaging Gateway 10.6.1 – Directory Traversal appeared first on Sapsi Security Services.

  • [webapps] – Symantec Messaging Gateway <= 10.6.1 – Directory Traversal

    [webapps] – Symantec Messaging Gateway <= 10.6.1 – Directory Traversal Symantec Messaging Gateway <= 10.6.1 – Directory Traversal http://www.exploit-db.com/rss.xml The post [webapps] – Symantec Messaging Gateway <= 10.6.1 – Directory Traversal appeared first on Sapsi Security Services.

  • Windows-Exploit-Suggester v3.2 – Compares a targets patch levels against the Microsoft vulnerability database

    Windows-Exploit-Suggester v3.2 – Compares a targets patch levels against the Microsoft vulnerability database This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. It requires […] The post Win...

  • ZDI-16-528: Adobe Digital Editions ePub Font Parsing Use-After-Free Remote Code Execution Vulnerability

    ZDI-16-528: Adobe Digital Editions ePub Font Parsing Use-After-Free Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Digital Editions. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. http://feeds.feedburner.com/ZDI-Publishe...

  • ZDI-16-527: Apple Safari HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability

    ZDI-16-527: Apple Safari HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. http://feeds.feedburner.com/ZDI-Published-Advisories The post...

  • [remote] – Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit)

    [remote] – Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit) Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit) http://www.exploit-db.com/rss.xml The post [remote] – Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit) appeared first on Sapsi Security Services.

  • [remote] – NetMan 204 – Backdoor Account

    [remote] – NetMan 204 – Backdoor Account NetMan 204 – Backdoor Account http://www.exploit-db.com/rss.xml The post [remote] – NetMan 204 – Backdoor Account appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 6 months ago

New blog articles detected

  • [dos] – Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write

    [dos] – Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write http://www.exploit-db.com/rss.xml The post [dos] – Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write appeared first on Sapsi Security Services.

  • [dos] – Microsoft Office PowerPoint 2010 – Invalid Pointer Reference

    [dos] – Microsoft Office PowerPoint 2010 – Invalid Pointer Reference Microsoft Office PowerPoint 2010 – Invalid Pointer Reference http://www.exploit-db.com/rss.xml The post [dos] – Microsoft Office PowerPoint 2010 – Invalid Pointer Reference appeared first on Sapsi Security Services.

  • [remote] – Kaltura 11.1.0-2 – Remote Code Execution (Metasploit)

    [remote] – Kaltura 11.1.0-2 – Remote Code Execution (Metasploit) Kaltura 11.1.0-2 – Remote Code Execution (Metasploit) http://www.exploit-db.com/rss.xml The post [remote] – Kaltura 11.1.0-2 – Remote Code Execution (Metasploit) appeared first on Sapsi Security Services.

  • [webapps] – VegaDNS 0.13.2 – Remote Command Injection

    [webapps] – VegaDNS 0.13.2 – Remote Command Injection VegaDNS 0.13.2 – Remote Command Injection http://www.exploit-db.com/rss.xml The post [webapps] – VegaDNS 0.13.2 – Remote Command Injection appeared first on Sapsi Security Services.

  • [local] – PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow

    [local] – PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow http://www.exploit-db.com/rss.xml The post [local] – PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow appeared first on Sapsi Security Services.

  • [webapps] – WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure

    [webapps] – WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure http://www.exploit-db.com/rss.xml The post [webapps] – WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure appeared first on Sapsi Security Services.

  • [local] – EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow

    [local] – EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow http://www.exploit-db.com/rss.xml The post [local] – EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow appeared first on Sapsi Security Services.

  • [local] – SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation

    [local] – SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation http://www.exploit-db.com/rss.xml The post [local] – SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation appeared first on Sapsi Security Services.

  • [local] – Docker Daemon – Privilege Escalation (Metasploit)

    [local] – Docker Daemon – Privilege Escalation (Metasploit) Docker Daemon – Privilege Escalation (Metasploit) http://www.exploit-db.com/rss.xml The post [local] – Docker Daemon – Privilege Escalation (Metasploit) appeared first on Sapsi Security Services.

  • [webapps] – Kajona 4.7 – Cross-Site Scripting / Directory Traversal

    [webapps] – Kajona 4.7 – Cross-Site Scripting / Directory Traversal Kajona 4.7 – Cross-Site Scripting / Directory Traversal http://www.exploit-db.com/rss.xml The post [webapps] – Kajona 4.7 – Cross-Site Scripting / Directory Traversal appeared first on Sapsi Security Services.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in