Aggregator
CVE-2019-0227 | Oracle Communications Session Route Manager 8.0.0/8.1.0/8.1.1/8.2.0 Core server-side request forgery (EDB-46682)
CVE-2017-6363 | GD Graphics Library up to 2.2.5 gd_tiff.c tiffWriter out-of-bounds (Issue 383)
CVE-2016-7523 | ImageMagick File coders/meta.c out-of-bounds (Issue 94 / ID 169354)
CVE-2016-7524 | ImageMagick File coders/meta.c out-of-bounds (Issue 96 / ID 169347)
CVE-2013-6451 | MediaWiki prior 1.19.10/1.21.4/1.22.1 CSS cross site scripting (Nessus ID 81227 / ID 12828)
CVE-2012-5340 | SumatraPDF/MuPDF PDF File lex_number integer overflow (Exploit 23246 / EDB-23246)
CVE-2012-2142 | Poppler up to 0.21.3 Escape Sequence Error.cc error escape output (Nessus ID 80824 / ID 123074)
Weekly Update 449
Today, I arrived at my PC first thing in the morning to find the UPS dead (battery was cactus) and the PC obviously without power. So, I tracked down a powerboard and some IEC C14 to mains cable adaptors and powered back up. On boot, neither the Bluetooth mouse nor
黑客利用 Ivanti ICS 零日漏洞对日本发起攻击
CVE-2012-6684 | RedCloth Library up to 4.2.9 on Ruby cross site scripting (ID 243 / Nessus ID 82151)
CVE-2023-29848 | Bang Resto 1.0 Add New Menu admin/menu.php itemName cross site scripting (Issue 171899 / EDB-51377)
研究人员发现 Rack::Static 漏洞,可能导致 Ruby 服务器数据泄露
朝鲜黑客通过空壳公司分发恶意软件
Apepe: Enumerate information from an app based on the APK file
Apepe Apepe is a Python tool developed to help pentesters and red teamers easily get information from the target app. This tool will extract basic pieces of information such as the package name if...
The post Apepe: Enumerate information from an app based on the APK file appeared first on Penetration Testing Tools.
tpotce: The All In One Honeypot Platform
T-Pot – The All In One Honeypot Platform T-Pot is based on the Debian (Stable) network installer. The honeypot daemons as well as other support components are dockered. This allows T-Pot to run multiple honeypot...
The post tpotce: The All In One Honeypot Platform appeared first on Penetration Testing Tools.