
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comentarios en: WordPress User ID and User Name Disclosure	</title>
	<atom:link href="https://www.talsoft.com.ar/site/es/research/security-advisories/wordpress-user-id-and-user-name-disclosure/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.talsoft.com.ar/site</link>
	<description>El Programa Talsoft ayuda a empresas a evaluar y mejorar su madurez en ciberseguridad mediante diagnóstico GAP, roadmap y acompañamiento tipo Fractional CISO.</description>
	<lastBuildDate>Tue, 30 May 2017 05:04:30 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		Por: Humans are the worst vulnerability &#8211; storia di un attacco di social engineering &#8211; FASTFIRE DOT ORG		</title>
		<link>https://www.talsoft.com.ar/site/es/research/security-advisories/wordpress-user-id-and-user-name-disclosure/#comment-3341</link>

		<dc:creator><![CDATA[Humans are the worst vulnerability &#8211; storia di un attacco di social engineering &#8211; FASTFIRE DOT ORG]]></dc:creator>
		<pubDate>Tue, 30 May 2017 05:04:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.talsoft.com.ar/?page_id=1352#comment-3341</guid>

					<description><![CDATA[[&#8230;] il test provando a verificare se è possibile eseguire la user enumeration (sfruttando questa vulnerabilità di WordPress), per scoprire quanti e quali utenti hanno la possibilità di collegarsi alla console [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] il test provando a verificare se è possibile eseguire la user enumeration (sfruttando questa vulnerabilità di WordPress), per scoprire quanti e quali utenti hanno la possibilità di collegarsi alla console [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Por: WordPress brute force amplification attack &#8211; How bad is it? &#124; shwnd.com		</title>
		<link>https://www.talsoft.com.ar/site/es/research/security-advisories/wordpress-user-id-and-user-name-disclosure/#comment-3336</link>

		<dc:creator><![CDATA[WordPress brute force amplification attack &#8211; How bad is it? &#124; shwnd.com]]></dc:creator>
		<pubDate>Tue, 13 Oct 2015 12:01:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.talsoft.com.ar/?page_id=1352#comment-3336</guid>

					<description><![CDATA[[&#8230;] post. The target was two different wordpress installations, both version 4.3.1. The attack uses the WordPress user enumeration flaw to determine usernames. Those usernames and custom password lists were then used to craft the [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] post. The target was two different wordpress installations, both version 4.3.1. The attack uses the WordPress user enumeration flaw to determine usernames. Those usernames and custom password lists were then used to craft the [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Por: Talsoft Advisory Security &#8211; WordPress User ID and User Name Disclosure &#124; TalSoft TS S.R.L.		</title>
		<link>https://www.talsoft.com.ar/site/es/research/security-advisories/wordpress-user-id-and-user-name-disclosure/#comment-3322</link>

		<dc:creator><![CDATA[Talsoft Advisory Security &#8211; WordPress User ID and User Name Disclosure &#124; TalSoft TS S.R.L.]]></dc:creator>
		<pubDate>Thu, 26 May 2011 12:35:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.talsoft.com.ar/?page_id=1352#comment-3322</guid>

					<description><![CDATA[[...] WordPress User ID and User Name Disclosure [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] WordPress User ID and User Name Disclosure [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
