Aggregator
CVE-2024-53258 | Autolab download_all_submissions exposure of private personal information to an unauthorized actor (1aa4c769)
CVE-2024-51771 | HPE Aruba Networking ClearPass Policy Manager up to 6.11.9/6.12.2 Web-based Management Interface os command injection (Nessus ID 212131)
CVE-2024-51772 | HPE Aruba Networking ClearPass Policy Manager up to 6.11.9/6.12.2 Web-based Management Interface os command injection (Nessus ID 212131)
CVE-2024-11704 | Mozilla Firefox up to 132 sec_pkcs7_decoder_start_decrypt memory corruption (Nessus ID 211873)
CVE-2024-11704 | Mozilla Thunderbird up to 132 sec_pkcs7_decoder_start_decrypt memory corruption (Nessus ID 211873)
CVE-2024-11706 | Mozilla Firefox up to 132 SEC_ASN1DecodeItem_Util null pointer dereference (Nessus ID 211873)
CVE-2024-11706 | Mozilla Thunderbird up to 132 SEC_ASN1DecodeItem_Util null pointer dereference (Nessus ID 211873)
Invoke-ADEnum: Automate Active Directory Enumeration using PowerView
Invoke-ADEnum Active Directory Enumeration Invoke-ADEnum is an Active Directory enumeration tool designed to automate the process of gathering information from an Active Directory environment, leveraging the capabilities of PowerView. With Invoke-ADEnum, you can quickly...
The post Invoke-ADEnum: Automate Active Directory Enumeration using PowerView appeared first on Penetration Testing Tools.
PortexAnalyzerGUI: Portable Executable and Malware Analysis Library
PortexAnalyzerGUI Graphical interface for PortEx, a Portable Executable and Malware Analysis Library PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly...
The post PortexAnalyzerGUI: Portable Executable and Malware Analysis Library appeared first on Penetration Testing Tools.
CVE-2002-0201 | Cyberstop Web Server 0.1 GET Request memory corruption (EDB-21237 / XFDB-7960)
CVE-2012-2332 | S9y serendipity up to 1.6.1 serendipity[plugin_to_conf] sql injection (EDB-18884 / BID-53418)
CVE-2006-1999 | OpenTTD 0.4.7 denial of service (EDB-1709 / Nessus ID 22325)
倒计时 6h,参会指南&详细议程
倒计时 6h,参会指南&详细议程
Tariff Wars: The Technology Impact
Tariff wars may hit technology leaders hard in 2025 as the Trump administration's 10% import tax, plus reciprocal tariffs, spikes costs. CIOs and CISOs face supply chain disruption and heightened cyber risks. But they can adapt with cloud shifts, smart deals and better advocacy.
Ransomware Underground Faces Declining Relevance
Ransomware groups' collective power to command victims' attention and compel extortion is waning, notwithstanding the disruption and chaos that continues to be their hallmark. The criminal underground powering ransomware is a world in flux where old, established groups are giving way to new brands.
The Convergence of IAM, Cybersecurity, Fraud and Compliance
Cybersecurity, IAM, fraud and compliance will converge across financial institutions in the next five to six years. This transformation will follow a phased path, beginning with data integration, followed by tool alignment and eventually team restructuring.
AI Outsmarts Human Red Teams in Phishing Tests
AI surpassed human red teams in crafting phishing attacks, at scale and with alarming success, asserts research from cybersecurity training firm Hoxhunt. The company's proprietary AI spear phishing agent, outperformed human counterparts by 24%, a turnaround from a31% deficit in 2023.
FedRAMP's Automation Goal Brings Major Promises - and Risks
The General Services Administration is aiming to speed up cloud approvals by automating security assessments for FedRAMP, but experts tell Information Security Media Group that key questions remain on its execution, with concerns over vague directives and the impact on existing processes.