Aggregator
CVE-2024-8340 | SourceCodester Electric Billing Management System 1.0 /Actions.php username sql injection
CVE-2024-8341 | SourceCodester Petshop Management System 1.0 add_user.php avatar unrestricted upload
CVE-2014-5882 | Homoo Ijiri 3.7 X.509 Certificate cryptographic issues (VU#582497)
新型PyPI攻击技术可能导致超2.2万软件包被劫持
CVE-2014-5881 | Yahoo! ybox 1.5.1 X.509 Certificate cryptographic issues (VU#582497)
DeadPotato: A Windows privilege escalation utility
DeadPotato DeadPotato is a Windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by...
The post DeadPotato: A Windows privilege escalation utility appeared first on Penetration Testing Tools.
wazuh: Host and endpoint security
Wazuh Wazuh helps you gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities: Log...
The post wazuh: Host and endpoint security appeared first on Penetration Testing Tools.
Amoco: tool for analysing binaries
Amoco Amoco is a Python package dedicated to the (static) analysis of binaries. It features: a generic framework for decoding instructions developed to reduce the time needed to implement support for new architectures. For...
The post Amoco: tool for analysing binaries appeared first on Penetration Testing Tools.
A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel
In the world of SaaS ITDR, the journey taken matters. There are solutions that began from an ITDR perspective. They built threat-hunting capabilities to parse through any data set, look for anomalies, and flag any activity that looks suspicious. It’s a reasonable approach taken by security organizations that lack a deep understanding of SaaS applications […]
The post A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel appeared first on Adaptive Shield.
The post A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel appeared first on Security Boulevard.
CVE-2024-41364 | MiczFlor RPi-Jukebox-RFID 2.7.0 htdocs\trackEdit.php code injection
CVE-2024-41361 | MiczFlor RPi-Jukebox-RFID 2.7.0 manageFilesFolders.php code injection
CVE-2024-41366 | MiczFlor RPi-Jukebox-RFID 2.7.0 htdocs\userScripts.php code injection
CVE-2024-41367 | MiczFlor RPi-Jukebox-RFID 2.7.0 appendFileToPlaylist.php code injection
CVE-2024-41369 | MiczFlor RPi-Jukebox-RFID 2.7.0 htdocs\inc.setWifi.php code injection
CVE-2024-41372 | Organizr 1.90 chat/settyping.php sql injection
CVE-2024-41370 | Organizr 1.90 chat/setlike.php sql injection
CVE-2024-41368 | MiczFlor RPi-Jukebox-RFID 2.7.0 inc.setWlanIpMail.php code injection
CVE-2007-1992 | Mamboxchange Com Zoom up to 2.5 exif_makernote.php mosConfig_absolute_path file inclusion (EDB-3706 / XFDB-33580)
Specialize in Securing Critical Infrastructure
Critical infrastructure encompasses the essential services and assets vital to the functioning of society and the economy. Specializing in security in this field requires a deep understanding of the challenges and threats facing sectors such as energy, transportation, healthcare and water systems.