Aggregator
CVE-2008-1990 | Acidcat CMS 3.4.1 Login default.asp username sql injection (EDB-5478 / XFDB-41918)
CVE-2008-1991 | Acidcat CMS 3.4.1 admin_colors_swatch.asp field cross site scripting (EDB-5478 / XFDB-41919)
CVE-2008-1992 | Acidcat CMS 3.4.1 default_mail_aspemail.asp access control (EDB-5478 / XFDB-41921)
CVE-2008-2091 | KubeLabs Kubelance 1.6.4 ipn.php path traversal (EDB-5477 / XFDB-41905)
CVE-2008-1939 | Aspindir Philboard 1.0 philboard_reply.asp forumid sql injection (EDB-5475 / XFDB-41957)
CVE-2008-1962 | Chimaera Aterr 0.9.1 file path traversal (EDB-5474 / XFDB-41903)
SDC2024倒计时3天!碰撞技术火花
福建省唯一入围企业!国投智能入选“2024年中国网络安全前二十家企业”名单
Scrollable Cards in iOS 18 - #30DaysOfSwift
JVN: Trend Micro Deep Discovery Inspector (DDI) における複数のSQLインジェクションの脆弱性
CVE-2016-1078 | Adobe Acrobat Reader up to 11.0.15/15.006 memory corruption (APSB16-14 / Nessus ID 91096)
CVE-2000-1190 | Jon Atkins imwheel .imwheelrc symlink (XFDB-4941)
微软运用欺骗性策略大规模打击网络钓鱼活动
FreeBuf | 字节大模型被实习生投毒;新的macOS漏洞可绕过安全控制
NIS2: Implementing Regulation della Commissione
Bear C2 Exposed: Russian APT’s Advanced Encryption Tactics
BEAR-C2 Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and...
The post Bear C2 Exposed: Russian APT’s Advanced Encryption Tactics appeared first on Penetration Testing Tools.
conjur: secures secrets used by privileged users and machine identities
Conjur Conjur provides secrets management and machine identity for modern infrastructure: Machine Authorization Markup Language (“MAML”), a role-based access policy language to define system components & their roles, privileges, and metadata A REST web...
The post conjur: secures secrets used by privileged users and machine identities appeared first on Penetration Testing Tools.
Cross-Platform Design Wrapped Part 3: UI Polish and Interaction Design
Rubeus: C# toolset for raw Kerberos interaction and abuses
Rubeus Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy’s Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX‘s MakeMeEnterpriseAdmin project (GPL v3.0 license). Full credit goes to Benjamin and Vincent for...
The post Rubeus: C# toolset for raw Kerberos interaction and abuses appeared first on Penetration Testing Tools.