Aggregator
35 岁危机: IT 从业者自救指南
CVE-2024-50217 | Linux Kernel up to 6.11.6 btrfs __btrfs_free_extra_devids use after free (47a83f8df395/aec8e6bf8391)
CVE-2024-1212 | Progress LoadMaster up to 7.1.35.10/7.2.48.9/7.2.54.7/7.2.59.1 os command injection
CVE-2024-10990 | SourceCodester Online Veterinary Appointment System 1.0 view_service.php id sql injection
CVE-2024-10991 | Codezips Hospital Appointment System 1.0 /editBranchResult.php ID sql injection
CVE-2024-10993 | Codezips Online Institute Management System 1.0 /manage_website.php website_image unrestricted upload
CVE-2024-10994 | Codezips Online Institute Management System 1.0 /edit_user.php image unrestricted upload
Kill
数字司法中的个人信息保护
Palo Alto Networks 确认 0day 漏洞正在被黑客利用
Suspected Russian Hackers Infect 20,000 IoT Devices
A threat actor with suspected ties to Russian nation-state hackers has listed thousands of IoT devices as proxy networks within minutes of their initial compromise. A campaign that began in 2020 has so far infected 20,000 IoT devices, according to a new report by Trend Micro.
Report: Over 100M Americans Rely on Vulnerable Water Systems
The Environmental Protection Agency inspector general said over 100 million Americans depend on drinking water systems exposed to cybersecurity flaws that could allow hackers to "disrupt service or cause irreparable physical damage to drinking water infrastructure."
WordPress Plugin Vulnerability Threatens 4 Million Sites
A widely deployed five-in-one security plugin for WordPress websites contained a flaw that hackers could automate into a large-scale takeover campaign. The critical authentication bypass vulnerability takes advantage of a now-patched flaw in the Really Simple Security plugin.
Entrust, Jumio, Sumsub Lead Identity Verification Gartner MQ
Gartner has recognized Entrust, Incode, Jumio, Socure and Sumsub as identity verification leaders amid a rise in regulatory demands and fraud prevention requirements. Identity verification was historically used for regulated onboarding in industries like banking, gambling and cryptocurrency.
Randall Munroe’s XKCD ‘Europa Clipper’
New AWS Control Policy on the Block
dnsReaper: subdomain takeover tool for attackers, bug bounty hunters and the blue team
DNS Reaper DNS Reaper is yet another subdomain takeover tool, but with an emphasis on accuracy, speed, and the number of signatures in our arsenal! We can scan around 50 subdomains per second, testing...
The post dnsReaper: subdomain takeover tool for attackers, bug bounty hunters and the blue team appeared first on Penetration Testing Tools.
Secure Stager: An x64 position-independent shellcode stager
Secure Stager This project demonstrates an x64 position-independent stager that verifies the stage it downloads prior to executing it. This offers a safeguard against man-in-the-middle attacks for those who are concerned about such things....
The post Secure Stager: An x64 position-independent shellcode stager appeared first on Penetration Testing Tools.
FISSURE: Frequency Independent SDR-based Signal Understanding and Reverse Engineering
FISSURE – The RF Framework Frequency Independent SDR-based Signal Understanding and Reverse Engineering FISSURE is an open-source RF and reverses engineering framework designed for all skill levels with hooks for signal detection and classification,...
The post FISSURE: Frequency Independent SDR-based Signal Understanding and Reverse Engineering appeared first on Penetration Testing Tools.