Aggregator
CVE-2022-48789 | Linux Kernel up to 5.4.180/5.10.101/5.15.24/5.16.10 nvme-tcp error_recovery use after free (Nessus ID 208672)
CVE-2022-48799 | Linux Kernel up to 5.16.9 perf perf_cgroup_switch iteration (Nessus ID 208672)
CVE-2022-48911 | Linux Kernel up to 5.16.12 nf_queue sock_hold use after free (Nessus ID 208672)
CVE-2022-48945 | Linux Kernel up to 6.1.1 vivid v4l2_rect_map_inside memory corruption (Nessus ID 208672)
CVE-2024-42010 | RoundCube up to 1.5.7/1.6.7 Cascading Style Sheet mod_css_styles information disclosure (Nessus ID 208677)
供应链安全问题已成为国际冲突“超限战”武器
业务安全“星选厂商”|海云安入选2024年度网络与信息安全行业代表性星选企业
CVE-2024-47651 | Shilpi Computers Client Dashboard prior 9.7.0 API Endpoint parameter pollution (CIVN-2024-0313)
CVE-2024-20102 | MediaTek MT8893 WLAN Driver out-of-bounds (MSV-1601 / ALPS08998892)
CVE-2024-7801 | Microchip TimeProvider 4100 up to 2.4.6 sql injection
CVE-2024-8804 | Code Embed Plugin up to 2.4 on WordPress cross site scripting
Argus: The Ultimate Information Gathering Toolkit
Argus Argus is an all-in-one, Python-powered toolkit designed to streamline the process of information gathering and reconnaissance. With a user-friendly interface and a suite of powerful modules, Argus empowers you to explore networks, web...
The post Argus: The Ultimate Information Gathering Toolkit appeared first on Penetration Testing Tools.
Loki: horizontally-scalable, highly-available, multi-tenant log aggregation system
Loki: like Prometheus, but for logs. Loki is a horizontally-scalable, highly-available, multi-tenant log aggregation system inspired by Prometheus. It is designed to be very cost-effective and easy to operate. It does not index the contents...
The post Loki: horizontally-scalable, highly-available, multi-tenant log aggregation system appeared first on Penetration Testing Tools.
ssh-mitm: intercepting proxy server for security audits
ssh-mitm – intercept ssh traffic ssh-mitm is an intercepting (mitm) proxy server for security audits. Redirect/mirror Shell to another ssh client supported in 0.2.8 Replace File in SCP supported in 0.2.6 Replace File in SFTP...
The post ssh-mitm: intercepting proxy server for security audits appeared first on Penetration Testing Tools.