Aggregator
CVE-2017-17605 | Consumer Complaints Clone Script 1.0 other-user-profile.php ID sql injection (ID 145310 / EDB-43274)
CVE-2017-7725 | concrete5 8.1.0 Cache Host Header Stored cross site scripting (EDB-41885 / BID-97649)
CVE-2017-17606 | Co-work Space Search Script 1.0 /list city sql injection (ID 145292 / EDB-43273)
CVE-2017-18195 | concrete5 up to 8.2.x Comment view_ajax.php cnvID input validation (EDB-44194 / ID 53605)
CVE-2017-15984 | Creative Management System CMS 1.4 index.php sql injection (EDB-43075)
回答一个关于 ViewState 反序列化的问题,感兴趣的朋友可以看一下
苹果通过iOS 26为iPhone 16系列带来25W无线充电 但仅限于MagSafe配件
bkcrack: Crack legacy zip encryption
bkcrack Crack legacy zip encryption with Biham and Kocher’s known-plaintext attack. Overview A ZIP archive may contain many entries whose content can be compressed and/or encrypted. In particular, entries can be encrypted with a...
The post bkcrack: Crack legacy zip encryption appeared first on Penetration Testing Tools.
AzureGoat: Damn Vulnerable Azure Infrastructure
AzureGoat: A Damn Vulnerable Azure Infrastructure Compromising an organization’s cloud infrastructure is like sitting on a gold mine for attackers. And sometimes, a simple misconfiguration or a vulnerability in web applications, is all an...
The post AzureGoat: Damn Vulnerable Azure Infrastructure appeared first on Penetration Testing Tools.
Mac — значит безопасно? Нет. Новый троян крадёт всё — от паролей до криптовалюты
谷歌更新服务条款明确打击YouTube跨区订阅行为 检测到将被暂停或取消订阅
Fake Antivirus Targets Russian Businesses: Inside a New Android Espionage Campaign
The malware Android.Backdoor.916.origin, uncovered by Doctor Web’s research laboratory, specifically targets the corporate sector in Russia and possesses extensive capabilities for surveillance and data theft. Its primary purpose is not mass infection but rather...
The post Fake Antivirus Targets Russian Businesses: Inside a New Android Espionage Campaign appeared first on Penetration Testing Tools.
CVE-2003-0151 | BEA Systems WebLogic Server up to 7.0 SP 1/7.0.0.1 SP 1 memory corruption (Nessus ID 11486 / ID 86656)
Lumma Unleashed: Inside the Vast Ecosystem Powering the World’s Top Infostealer
Experts from Insikt Group have presented the first comprehensive investigation into the activities of Lumma Stealer affiliates—one of the most widespread families of data-stealing malware. Covering the period from mid-2024 through the first half...
The post Lumma Unleashed: Inside the Vast Ecosystem Powering the World’s Top Infostealer appeared first on Penetration Testing Tools.
Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by millions are covertly connected AND insecure Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300) Apple has fixed yet another vulnerability (CVE-2025-43300) that has … More →
The post Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day appeared first on Help Net Security.
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 59
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 59
Bidding War: A New Firm Is Offering a Record $20 Million for Zero-Day Exploits
A new entrant from the United Arab Emirates has shaken up the tightly controlled vulnerability market. Advanced Security Solutions, launched in August, has announced its willingness to pay up to $20 million for smartphone...
The post Bidding War: A New Firm Is Offering a Record $20 Million for Zero-Day Exploits appeared first on Penetration Testing Tools.
Microsoft Restricts China’s Access to Vulnerability Data After Suspected Leaks
Microsoft has restricted Chinese companies’ access to early notifications about vulnerabilities in its products. The decision follows an internal investigation into potential leaks from the Microsoft Active Protections Program (MAPP), a system designed to...
The post Microsoft Restricts China’s Access to Vulnerability Data After Suspected Leaks appeared first on Penetration Testing Tools.