Aggregator
CVE-2024-8881 | Zyxel GS1900-48 up to V2.80(AAHN.1)C0 HTTP Request os command injection
Four New Balbix Capabilities You’ll Love!
CVE-2024-49395 | NeoMutt Header Field Bcc information disclosure
CVE-2024-49394 | NeoMutt Header Field In-Reply-To data authenticity
CVE-2024-49393 | NeoMutt Header Field To/Cc data authenticity
CVE-2024-47595 | SAP Host Agent 7.22 privileges assignment
CVE-2024-47590 | SAP Web Dispatcher up to WEBDISP 7.77 incomplete filtering of special elements
CVE-2024-52533 | GNOME GLib up to 2.82.0 gio/gsocks4aproxy.c SOCKS4_CONN_MSG_LEN buffer overflow (ID 3461)
pwnlook: an offensive post exploitation tool
pwnlook Pwnlook is an offensive post exploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it. What it does: List mailboxes List folders...
The post pwnlook: an offensive post exploitation tool appeared first on Penetration Testing Tools.
CVE-2024-23983 | Ping Identity PingAccess up to 8.1.0 url encoding
CVE-2024-51026 | NetAdmin IAM system 4.0.30319 /BalloonSave.ashx Content cross site scripting
CVE-2024-25255 | Sublime Text 4 New Build System Module command injection
CVE-2024-25253 | Driver Booster 10.6 Customize Proxy Module Host buffer overflow
CVE-2024-51213 | Online Shop Store 1.0 login.php cross site scripting
CVE-2024-50601 | Axigen Mail Server up to 10.3.3.66/10.4.41/10.5.27/10.5.28 themeMode/_h cross site scripting
CVE-2024-25254 | SuperScan 4.1 Hostname/IP buffer overflow
pandora: A red team tool to extract credentials from password managers
Pandora This is a red team tool that assists in gathering credentials from different password managers. They are separated into three categories, Windows 10 desktop applications, browsers, and browser plugins. This may work on...
The post pandora: A red team tool to extract credentials from password managers appeared first on Penetration Testing Tools.
Wapiti: web-application vulnerability scanner
Wapiti works as a “black-box” vulnerability scanner, that means it won’t study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links...
The post Wapiti: web-application vulnerability scanner appeared first on Penetration Testing Tools.