Aggregator
CVE-2009-4780 | phpMyFAQ 0.65 index.php question cross site scripting (EDB-33385 / BID-37180)
CVE-2009-4446 | Ikemcg phpInstantGallery 1.1 admin.php cross site scripting (EDB-10709 / XFDB-55062)
85 секунд ада для металла. Двигатель Typhoon рвётся в космос — и в конкуренты SpaceX
CVE-2024-27066 | Linux Kernel up to 6.6.22/6.7.10/6.8.1 virtio use_dma_api memory leak (WID-SEC-2024-1008)
CVE-2024-27063 | Linux Kernel up to 6.6.23/6.7.11/6.8.2 netdev get_device_state denial of service (WID-SEC-2024-1008)
CVE-2024-27064 | Linux Kernel up to 6.6.22/6.7.10/6.8.1 Netfilter nft_netdev_register_hooks memory leak (WID-SEC-2024-1008)
CVE-2024-27065 | Linux Kernel up to 6.8.1 nf_tables comparison (Nessus ID 209785 / WID-SEC-2024-1008)
CVE-2024-27061 | Linux Kernel up to 6.6.23/6.7.11 Virtual Address sun8i_ce_cipher_unprepare null pointer dereference (dc60b25540c8/51a7d338c212/183420038444 / WID-SEC-2024-1008)
CVE-2024-27062 | Linux Kernel up to 6.6.23/6.7.11 nouveau allocation of resources (6887314f5356/96c875184417/b7cc4ff787a5 / Nessus ID 209785)
2025 Let's GoSSIP 软件安全暑期学校预告第五弹——CADO-NFS
Wireless Penetration Testing Cheatsheet
Labubu-бум выходит из-под контроля: потасовки, подделки и миллионы конфискатов
Кофе кипит — процессор охлаждается. Хакер собрал ПК в кофемашине и запитал его эспрессо
Critical Flaw in Cursor AI: Prompt Injection Allows Remote Code Execution
A critical vulnerability has been discovered in the Cursor source code editor, an AI-powered tool designed to assist programmers. The flaw, identified as CVE-2025-54135 and dubbed CurXecute, affects nearly all versions of the IDE...
The post Critical Flaw in Cursor AI: Prompt Injection Allows Remote Code Execution appeared first on Penetration Testing Tools.
Weekly Update 463
I've listened to a few industry podcasts discussing the Tea app breach since recording, and the thing that really struck me was the lack of discussion around the privacy implications of the service before the breach. Here was a tool where people were non-consensually uploading photos of others
Weekly Update 463
CobaltStrike Beacon C++ 源码开源分享
New Akira Ransomware Wave Hits SonicWall Devices, Zero-Day Vulnerability Suspected
Since mid-July, a surge in ransomware attacks leveraging the Akira strain has been observed, specifically targeting SonicWall devices. According to cybersecurity firm Arctic Wolf, threat actors have been actively exploiting SSL VPN connections on...
The post New Akira Ransomware Wave Hits SonicWall Devices, Zero-Day Vulnerability Suspected appeared first on Penetration Testing Tools.
Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
Email protection mechanisms, originally conceived as a bulwark against malicious links, have ironically become unwitting allies to cybercriminals. Researchers have uncovered a troubling trend: threat actors are increasingly exploiting “link wrappers” provided by platforms...
The post Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping appeared first on Penetration Testing Tools.