Posts with tag vulnerabilities

Attack prototypes already present

jQuery below 3.5.0 vulnerable to cross-site scripting

All jQuery versions below 3.5.0 are vulnerable to cross-site scripting (XSS) attacks. If exploited successfully, an attacker can trick the user’s browser to render a malicious page or hijack a user session. It is even possible to execute remote code. It is recommended to update to jQuery >= 3.5.0

Current most dangerous vulnerabilities, always up to date

Latest Cyber Threats and Vulnerabilities

TOP 10 THREATS ◦ Top 10 Threats (STATS) OPERATING SYSTEMS ◦ Microsoft Windows (STATS) ◦ Linux (STATS) ◦ Google Android (STATS) ◦ Apple iOS (STATS) ◦ Mac OS X (STATS) WEB BROWSER ◦ Mozilla Firefox (STATS) ◦ Google Chrome (STATS) ◦ Microsoft Internet Explorer (STATS) ◦ Microsoft Edge (STATS) ◦ Opera (STATS) ◦ Tor (STATS) JAVASCRIPT ◦ jQuery (STATS) ◦ jQuery UI (STATS) ◦ Bootstrap (STATS) ◦ Angular (STATS) ◦ NodeJS (STATS)

Most dangerous vulnerabilities, always up to date

Latest Cyber Threats and Vulnerabilities

The new Latest Cyber Threats section on lists the most dangerous and impacting threats currently known. We use multiple CVE sources to create the list, which we then consolidate and categorize. Our algorithm searches for threats with high risk and impact so that only the really relevant vulnerabilities are shown.

AppLocker cannot stop administrative users

How to break Windows 10 AppLocker

Recently I followed the tracks of an attacker who had exploited administrator rights on an unpatched Windows 10 System. Further attacks on other internal systems were initially stopped by Windows 10 AppLocker. The execution of powershell/cmd where also forbidden by AppLocker. Minutes later, the hacker had overcome this security measure and continued his attack. AppLocker obviously had to have a vulnerability.

Several dangerous attacks possible

jQuery below 3.4.0 vulnerable to prototype pollution

All jQuery versions below 3.4.0 are affected by a new hacking technique called prototype pollution. Successful exploitation could allow an attacker to modify existing object properties, including security properties such as cookies or tokens. Privilege escalation, content manipulation, application hijacking and even remote code execution is possible.