Aggregator
观点 | 人工智能时代“网络水军”的危害与治理策略
观点 | 生成式人工智能的技术局限和伦理风险
前沿 | 网络法治护航数字丝路 为全球数字治理贡献中国智慧
专家解读 | 王建民:以国家数据标准体系为支撑,加速构建数据领域发展新格局
专题·“微软蓝屏”事件 | 美国软件供应链安全政策的演进及对我国的启示
CVE-2008-4874 | Philips Electronics VOIP841 DECT Phone 1.0.4.48 Firmware credentials management (EDB-5113 / BID-27790)
CVE-2008-1229 | JSPWiki 2.4.104/2.5.139/2.5.139 Beta edit.jsp editor cross site scripting (EDB-5112 / XFDB-40507)
CVE-2008-1230 | JSPWiki 2.4.104/2.5.139/2.5.139 Beta File Upload jsp access control (EDB-5112 / XFDB-40511)
CVE-2008-1231 | JSPWiki 2.4.104/2.5.139/2.5.139 Beta edit.jsp editor path traversal (EDB-5112 / Nessus ID 57322)
CVE-2008-0778 | Apple QuickTime 7.4.1 ActiveX Control qtplugin.ocx sethref memory corruption (EDB-5110 / XFDB-40475)
CVE-2008-0794 | Affiliate Market 0.1 Beta language path traversal (EDB-5108 / XFDB-40472)
CVE-2008-0795 | MGFi XfaQ 1.2 on Mambo/Joomla index.php aid sql injection (EDB-5109 / XFDB-40494)
CVE-2008-0108 | Microsoft Works 2005/8.0 wkcvqd01.dll memory corruption (EDB-5107 / Nessus ID 33107)
reNgine: an automated reconnaissance framework
reNgine reNgine is an automated reconnaissance framework with a focus on a highly configurable streamlined recon process. reNgine is backed by a database, with data correlation and organization, the custom query “like” language for...
The post reNgine: an automated reconnaissance framework appeared first on Penetration Testing Tools.
CVE-2018-4384 | Apple iOS up to 12.0.1 AppleAVD memory corruption (HT209192 / EDB-45786)
OpenBAS: Open Breach and Attack Simulation Platform
OpenBAS OpenBAS is an open-source platform allowing organizations to plan, schedule, and conduct cyber adversary simulation campaigns and tests. The goal is to create a powerful, reliable, and open-source tool to effectively plan and...
The post OpenBAS: Open Breach and Attack Simulation Platform appeared first on Penetration Testing Tools.
RecoverPy: Recover overwritten or deleted data
RecoverPy You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files. RecoverPy searches through every block of your partition to find your request....
The post RecoverPy: Recover overwritten or deleted data appeared first on Penetration Testing Tools.