Articles tagged with: #xss Clear filter
MCP Kali server + LLM demo  -  would you use this to automate pentesting?

MCP Kali server + LLM demo - would you use this to automate pentesting?

cybersecurity www.reddit.com

Hey folks - I watched a recent YouTube demo where someone set up a local "MCP / CalMCP" server on Kali and connected an LLM (via VS Code / Copilot) so the model could send commands to the Kali machine. In the video the LLM automatically discovered a reflected XSS in a lab, ran payloads, and produced a PoC - all with minimal human interaction. A few important notes up front: I did not create that video - I'm sharing it to spark discussion. Also: this workflow is NOT for beginners. You...

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

The Hacker News thehackernews.com

A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic Web Client that arises as a result of insufficient sanitization of HTML content in ICS calendar files,

Hackers Exploit Zimbra Vulnerability as 0-Day with Weaponized iCalendar Files

Hackers Exploit Zimbra Vulnerability as 0-Day with Weaponized iCalendar Files

Cyber Security News cybersecuritynews.com

A zero-day vulnerability in the Zimbra Collaboration Suite (ZCS) was actively exploited in targeted attacks earlier in 2025. The flaw, identified as CVE-2025-27915, is a stored cross-site scripting (XSS) vulnerability that attackers leveraged by sending weaponized iCalendar (.ICS) files to steal sensitive data from victims' email accounts. The attacks were first identified by StrikeReady, which

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies

Cyber Security News cybersecuritynews.com

An operator known as GhostSocks advertised a novel Malware-as-a-Service (MaaS) on the Russian cybercrime forum XSS.is on October 15, 2023, promising to transform compromised devices into residential SOCKS5 proxies. The service capitalized on the inherent trust placed in residential IP addresses to bypass anti-fraud systems and avoid detection by network defenders. Early promotional posts showcased

VU#780141: Cross-site scripting vulnerability in Lectora course navigation

VU#780141: Cross-site scripting vulnerability in Lectora course navigation

CERT Recently Published Vulnerability Notes kb.cert.org

Overview Lectora Desktop versions 21.0 - 21.3 and Lectora Online versions 7.1.6 and older contained a cross-site scripting (XSS) vulnerability in courses published with Seamless Play Publish (SPP) enabled and Web Accessibility disabled. The vulnerability was initially patched in Lectora Desktop version 21.4 (October 25, 2022), but users must republish existing courses to apply the patch. This important republishing instruction was missing from the Desktop edition release notes, but it was...

Acunetix 360 enormous number of 500 response code

Acunetix 360 enormous number of 500 response code

cybersecurity www.reddit.com

Hi, I'm using Acunetix 360 for scanning our publicly facing application. Unfortunately IT complains that the scan generates over 60 thousand of 500 response codes and also leads to application crash and appool recycling. I've disabled resource intensive checks like "Analyze JavaScript / AJAX" or "DOM-based XSS" and followed optimalization wizard but the issue still persist. Any advise? submitted by /u/PiotrIr [link] [comments]

Microsoft Confirms 900+ XSS Vulnerabilities Found in IT Services, Ranging from Low Impact to Zero-Click

Microsoft Confirms 900+ XSS Vulnerabilities Found in IT Services, Ranging from Low Impact to Zero-Click

Cyber Security News cybersecuritynews.com

Of all the vulnerabilities that plague modern applications, Cross-Site Scripting (XSS) is one of the oldest and most persistent. Despite being a known threat for over two decades, XSS continues to appear in everything from legacy systems to new, cloud-native architectures. The Microsoft Security Response Center (MSRC) recently highlighted the enduring nature of this threat,

Cybersecurity AI: Hacking the AI Hackers via Prompt Injection

Cybersecurity AI: Hacking the AI Hackers via Prompt Injection

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.21669v1 Announce Type: new Abstract: We demonstrate how AI-powered cybersecurity tools can be turned against themselves through prompt injection attacks. Prompt injection is reminiscent of cross-site scripting (XSS): malicious text is hidden within seemingly trusted content, and when the system processes it, that text is transformed into unintended instructions. When AI agents designed to find and exploit vulnerabilities interact with malicious web servers, carefully crafted reponses...

Nagios XSS Vulnerability Let Remote Attackers to Execute Arbitrary JavaScript

Nagios XSS Vulnerability Let Remote Attackers to Execute Arbitrary JavaScript

Cyber Security News cybersecuritynews.com

Nagios XI, a widely-deployed network monitoring solution, has addressed a critical cross-site scripting (XSS) vulnerability in its Graph Explorer feature that could enable remote attackers to execute malicious JavaScript code within users' browsers. The security flaw was patched in version 2024R2.1, released on August 12, 2025, following responsible disclosure by security researcher Marius Lihet. Key

Critical Flaws in Base44 Exposed Sensitive Data and Allowed Account Takeovers

Critical Flaws in Base44 Exposed Sensitive Data and Allowed Account Takeovers

Blog www.imperva.com

Our research uncovered multiple critical vulnerabilities in Base44, an AI-powered platform that lets you turn any idea into a fully functional custom app. These flaws ranged from an open redirect that leaked access tokens, to stored cross-site scripting (XSS), insecure authentication design, sensitive data leakage, and client-side-only enforcement of premium features. Together, they represented a

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript

Cyber Security News cybersecuritynews.com

A stored cross-site scripting (XSS) flaw identified in IPFire 2.29's web-based firewall interface (firewall.cgi). Tracked as CVE-2025-50975, the vulnerability allows any authenticated administrator to inject persistent JavaScript into firewall rule parameters. Once stored, the payload executes automatically when another administrator loads the rules page, potentially resulting in session hijacking, unauthorized actions within the interface, or

Major password managers can leak logins in clickjacking attacks

Major password managers can leak logins in clickjacking attacks

cybersecurity www.reddit.com

Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details. Threat actors could exploit the security issues when victims visit a malicious page or websites vulnerable to cross-site scripting (XSS) or cache poisoning, where attackers overlay invisible HTML elements over the password manager interface. While users believe they are interacting with...

Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines

Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines

Cyber Security News cybersecuritynews.com

A critical security flaw in Lenovo's AI chatbot "Lena" has been discovered that allows attackers to execute malicious scripts on corporate machines through simple prompt manipulation. The vulnerability, identified by cybersecurity researchers, exploits Cross-Site Scripting (XSS) weaknesses in the chatbot's implementation, potentially exposing customer support systems and enabling unauthorized access to sensitive corporate data. Key