Aggregator
CVE-2012-3317 | IBM WebSphere Message up to 8.0.0.1 Uninstaller access control (swg21611401 / ID 120709)
CVE-2012-3359 | Red Hat Enterprise Linux 5 credentials management (Bug 607179 / Nessus ID 68699)
Palo Alto Networks 修复防火墙曾被用于 DoS 攻击的漏洞
Palo Alto Networks 修复防火墙曾被用于 DoS 攻击的漏洞
Eclipse: Hijacking Activation Context for Arbitrary DLL Injection
Eclipse Eclipse is a PoC that performs Activation Context hijack to load and run an arbitrary DLL in any desired process. Initially, this technique was created as a more flexible alternative to DLL Sideloading + DLL...
The post Eclipse: Hijacking Activation Context for Arbitrary DLL Injection appeared first on Penetration Testing Tools.
hcltm: Threat Modeling with HCL
hcltm Threat Modeling with HCL Overview There are many different ways in which a threat model can be documented. From a simple text file to more in-depth word documents, to fully instrumented threat models...
The post hcltm: Threat Modeling with HCL appeared first on Penetration Testing Tools.
Cloak: evade deep-packet-inspection based censorship
Cloak Cloak is a pluggable transport that works alongside traditional proxy tools like OpenVPN to evade deep-packet-inspection-based censorship. Cloak is not a standalone proxy program. Rather, it works by masquerading proxy tool’s traffic as normal...
The post Cloak: evade deep-packet-inspection based censorship appeared first on Penetration Testing Tools.
CVE-2004-0393 | rlpr daemon 2.0.4 msg format string (EDB-307 / Nessus ID 15361)
CVE-2019-13605 | CentOS-WebPanel.com CentOS Web Panel 0.9.8.838 improper authentication (ID 153665 / EDB-47123)
CVE-2007-4571 | Linux Kernel 2.6.22.7 snd_mem_proc_read count information disclosure (EDB-30605 / Nessus ID 67595)
美国新规要求医疗机构72小时内恢复数据并加强年度网络安全审计
美国新规要求医疗机构 72 小时内恢复数据并加强年度网络安全审计
CVE-2004-0416 | CVS up to 1.12.8 memory corruption (EDB-392 / Nessus ID 15356)
Protecting Highly Sensitive Health Data for Research
Four-Faith Routers Exploited Using New Flaw
Hackers are exploiting a high-severity command injection vulnerability in Chinese-manufactured Four-Faith industrial routers. Typical customers of Four-Faith use the routers for remote monitoring, control systems, supervisory control and data acquisition networks.
A Year of AI Pragmatism and Paradigm Shifts
The AI landscape is set to transform in 2025 with pragmatic approaches to implementation replacing the experimental fervor. This shift will span industries and developer ecosystems. Technologies will ride on the transformative power of AI and the responsibility that comes with it.
Palo Alto Firewalls Backdoored by Suspected Chinese Hackers
A suspected Chinese hacking campaign that began in November is exploiting a vulnerability in Palo Alto firewalls to install a custom malware backdoor for espionage. UNC5325 activity aligns with the Chinese hacking strategy of targeting edge devices.
Chinese Hackers Breach US Treasury in 'Major Incident'
The U.S. Treasury Department notified lawmakers Friday that the agency was the victim of a major cyberattack in which Chinese-linked hackers gained access to unclassified documents after gaining access to remote workstations through a third-party software provider, BeyondTrust.