Aggregator
Re @dx3one Omg … wow. I think I created this meme 5 years ago.
11 months ago
SSRF 漏洞自动化 寻找
11 months ago
SSRF 漏洞自动化 寻找
11 months ago
环境搭建下载项目https://github.com/l4yn3/micro_service_seclab然后放入 IDEA 即可,之后运行这里主要研究 SSRFSSRF 的漏洞代码package c
“We’ve been breached, and we have no idea how the attackers got in. We use an Ivanti VPN gateway, a Fortinet firewall, an IronPort mail gateway, and...
11 months ago
CVE-2015-2198 | Beehive Forum 1.4.4 edit_prefs.php avatar_url cross site scripting (EDB-36154)
11 months ago
A vulnerability, which was classified as problematic, has been found in Beehive Forum 1.4.4. Affected by this issue is some unknown functionality of the file edit_prefs.php. The manipulation of the argument avatar_url leads to cross site scripting.
This vulnerability is handled as CVE-2015-2198. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
攻防3.0 - 信任攻击
11 months ago
Author: sm0nk@深蓝攻防实验室上周在一个技术沙龙我分享了一个攻防相关议题——进击的白巨人,在此归档。无论是端侧产品还是流量侧产品、亦或是原生安全还是外挂式,主模式还是鉴黑和鉴白;随着防守方
攻防3.0 - 信任攻击
11 months ago
饱和攻击、对抗攻击、信任攻击;白能力
CVE-2015-6809 | BEdita up to 3.5.x saveConfig data[description] cross site scripting (Issue 623 / EDB-38051)
11 months ago
A vulnerability was found in BEdita up to 3.5.x. It has been classified as problematic. This affects an unknown part of the file index.php/admin/saveConfig. The manipulation of the argument data[description] leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2015-6809. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2003-1532 | Julien Desaunay PhpMyShop 1.00 compte.php identifiant/password sql injection (EDB-22209 / BID-6746)
11 months ago
A vulnerability was found in Julien Desaunay PhpMyShop 1.00. It has been declared as critical. This vulnerability affects unknown code of the file compte.php. The manipulation of the argument identifiant/password leads to sql injection.
This vulnerability was named CVE-2003-1532. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2013-3575 | HP Insight Diagnostics 9.4.0.4710 Perl pageview.php path input validation (VU#324668 / EDB-38563)
11 months ago
A vulnerability has been found in HP Insight Diagnostics 9.4.0.4710 and classified as critical. Affected by this vulnerability is an unknown functionality of the file pageview.php of the component Perl. The manipulation of the argument path leads to improper input validation.
This vulnerability is known as CVE-2013-3575. The attack can only be initiated within the local network. Furthermore, there is an exploit available.
vuldb.com
Analysis of Counter-Ransomware Activities in 2024
11 months ago
The scourge of ransomware continues primarily because ofthree main reasons: Ransomware-as-a-Servic
GoIda CTF
11 months ago
Name: GoIda CTF (an GoIda CTF event.)
Date: Jan. 7, 2025, midnight — 09 Jan. 2025, 23:59 UTC [add to calendar]
Format: Jeopardy
On-line
Location: On-line
Offical URL: https://goidactf.ru/
Rating weight: 0.00
Event organizers: GoIda CTF ORG
Date: Jan. 7, 2025, midnight — 09 Jan. 2025, 23:59 UTC [add to calendar]
Format: Jeopardy
On-line
Location: On-line
Offical URL: https://goidactf.ru/
Rating weight: 0.00
Event organizers: GoIda CTF ORG
Dreamhack CTF Season 7 Round #1 (Div. 1)
11 months ago
Name: Dreamhack CTF Season 7 Round #1 (Div. 1) (an Dreamhack CTF event.)
Date: Jan. 11, 2025, midnight — 11 Jan. 2025, 15:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://dreamhack.io/ctf/655
Rating weight: 0
Event organizers: Dreamhack
Date: Jan. 11, 2025, midnight — 11 Jan. 2025, 15:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://dreamhack.io/ctf/655
Rating weight: 0
Event organizers: Dreamhack