Aggregator
CVE-2012-5963 | portable SDK for UPnP 1.3.1 unique_service_name memory corruption (DSA-2614 / VU#922681)
Windows 11 добавляет поддержку passkey от 1Password
CVE-2017-4914 | VMware vSphere Data Protection 5.5.x /5.8.x/6.0.x/6.1.x deserialization (EDB-42152 / Nessus ID 100717)
CVE-2005-2917 | Squid Proxy up to 2.5.STABLE10 NTLM Authentication denial of service (Nessus ID 20010 / ID 117736)
CVE-2005-2929 | ISC Lynx 2.8.5/2.8.6/2.8.6 Dev13 Lynx URI access control (Nessus ID 21872 / ID 117801)
CVE-2005-2938 | Apple itunes 4.7.1.30/5.0 ituneshelper.exe access control (Nessus ID 20219 / ID 38495)
CVE-2005-2931 | Ipswitch Ipswitch Collaboration Suite up to 8.19 SMTP Service memory corruption (Nessus ID 20319 / ID 74202)
CVE-2005-2993 | HP Tru64 4.0f/5.1b3 denial of service (Nessus ID 20803 / ID 27278)
CVE-2005-2978 | netpbm up to 10.24 memory corruption (Bug 168278 / Nessus ID 22744)
CVE-2005-2977 | PAM 0.80 on SELinux unix_chkpwd information disclosure (Bug 168180 / Nessus ID 21966)
CVE-2005-2996 | Veritas StorageCentral 5.2 Rev. 2190r DCOM Server stack-based overflow (VU#927793 / ID 38473)
CVE-2005-3001 | Sun Solaris 10.0 on SPARC/x86 tl Driver serializer_enter denial of service (Nessus ID 19746 / ID 115278)
CVE-2005-2996 | Veritas Storage Exec up to 5.3 rev 2190R DCOM Server stack-based overflow (VU#927793 / ID 38473)
CVE-2005-3015 | IBM Lotus Domino Enterprise Server 6.5.2 cross site scripting (Nessus ID 19764 / ID 12222)
CVE-2005-3054 | PHP 4.4.0 curl/gd information disclosure (Nessus ID 20624 / ID 12201)
RemoteMonologue: New Windows Technique Weaponizes DCOM for NTLM Credential Harvesting
RemoteMonologue is a Windows credential harvesting technique that enables remote user compromise by leveraging the Interactive User RunAs key and coercing NTLM authentications via DCOM. Features 🔹 Authentication Coercion via DCOM (-dcom) Targets three DCOM...
The post RemoteMonologue: New Windows Technique Weaponizes DCOM for NTLM Credential Harvesting appeared first on Penetration Testing Tools.
Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Stealthy backdoor found hiding in SOHO devices running Linux SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. Breaking the … More →
The post Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched appeared first on Help Net Security.
“LapDogs” Unmasked: China-Linked Actors Build Covert ORB Network on 1,000+ SOHO Devices for Espionage
In a sweeping espionage campaign dubbed LapDogs, over a thousand small office and home office devices were compromised. Researchers from the STRIKE team at SecurityScorecard reported that the attack was linked to Chinese threat...
The post “LapDogs” Unmasked: China-Linked Actors Build Covert ORB Network on 1,000+ SOHO Devices for Espionage appeared first on Penetration Testing Tools.
CISA, FBI, NSA Urge Software Industry: Adopt Memory-Safe Languages to Drastically Cut Vulnerabilities
The leading cybersecurity agencies in the United States—CISA and the NSA—have issued a joint report urging software developers to adopt so-called memory-safe programming languages. These are technologies inherently designed to protect against critical memory-related...
The post CISA, FBI, NSA Urge Software Industry: Adopt Memory-Safe Languages to Drastically Cut Vulnerabilities appeared first on Penetration Testing Tools.