Aggregator
CVE-2012-3207 | Oracle Solaris 9/10/11 Kernel denial of service (cpuoct2012-1515893 / Nessus ID 59443)
CVE-2005-3346 | OSH 1.7.14 main.c getenv $var/evar=arg memory corruption (EDB-1300 / Nessus ID 22784)
CVE-2012-3291 | Infradead OpenConnect up to 3.17 memory corruption (dsa-2495 / Nessus ID 75056)
CVE-2012-3325 | IBM WebSphere Application Server up to 6.1.0.10 input validation (Nessus ID 62394 / ID 87112)
CVE-2012-3317 | IBM WebSphere Message up to 8.0.0.1 Uninstaller access control (swg21611401 / ID 120709)
CVE-2012-3359 | Red Hat Enterprise Linux 5 credentials management (Bug 607179 / Nessus ID 68699)
Palo Alto Networks 修复防火墙曾被用于 DoS 攻击的漏洞
Palo Alto Networks 修复防火墙曾被用于 DoS 攻击的漏洞
Eclipse: Hijacking Activation Context for Arbitrary DLL Injection
Eclipse Eclipse is a PoC that performs Activation Context hijack to load and run an arbitrary DLL in any desired process. Initially, this technique was created as a more flexible alternative to DLL Sideloading + DLL...
The post Eclipse: Hijacking Activation Context for Arbitrary DLL Injection appeared first on Penetration Testing Tools.
hcltm: Threat Modeling with HCL
hcltm Threat Modeling with HCL Overview There are many different ways in which a threat model can be documented. From a simple text file to more in-depth word documents, to fully instrumented threat models...
The post hcltm: Threat Modeling with HCL appeared first on Penetration Testing Tools.
Cloak: evade deep-packet-inspection based censorship
Cloak Cloak is a pluggable transport that works alongside traditional proxy tools like OpenVPN to evade deep-packet-inspection-based censorship. Cloak is not a standalone proxy program. Rather, it works by masquerading proxy tool’s traffic as normal...
The post Cloak: evade deep-packet-inspection based censorship appeared first on Penetration Testing Tools.
CVE-2004-0393 | rlpr daemon 2.0.4 msg format string (EDB-307 / Nessus ID 15361)
CVE-2019-13605 | CentOS-WebPanel.com CentOS Web Panel 0.9.8.838 improper authentication (ID 153665 / EDB-47123)
CVE-2007-4571 | Linux Kernel 2.6.22.7 snd_mem_proc_read count information disclosure (EDB-30605 / Nessus ID 67595)
美国新规要求医疗机构72小时内恢复数据并加强年度网络安全审计
美国新规要求医疗机构 72 小时内恢复数据并加强年度网络安全审计
CVE-2004-0416 | CVS up to 1.12.8 memory corruption (EDB-392 / Nessus ID 15356)
Protecting Highly Sensitive Health Data for Research
Four-Faith Routers Exploited Using New Flaw
Hackers are exploiting a high-severity command injection vulnerability in Chinese-manufactured Four-Faith industrial routers. Typical customers of Four-Faith use the routers for remote monitoring, control systems, supervisory control and data acquisition networks.