Aggregator
CVE-2023-52907 | Linux Kernel up to 6.1.6 mm/kasan/shadow.c pn533_usb_send_frame use after free
CVE-2024-43138 | MagePeople Team Event Manager for WooCommerce Plugin up to 4.2.1 on WordPress path traversal
CVE-2024-7733 | FastCMS up to 0.1.5 New Article Category Page cross site scripting
CVE-2024-36446 | Mitel MiVoice MX-ONE up to 7.6 SP1 access control
CVE-2024-23497 | Intel Ethernet Network Controllers and Adapters 4.4 on Linux Kernel Mode Driver out-of-bounds write (intel-sa-00918)
CVE-2024-28947 | Intel Server Board S2600ST Family prior 02.01.0017 Kernel Mode Driver input validation (intel-sa-01121)
CVE-2024-24977 | Intel License Manager for FLEXlm Product Software prior 11.19.5.0 uncontrolled search path (intel-sa-01126)
CVE-2024-25561 | Intel HID Event Filter Software Installer prior 2.2.2.1 insecure inherited permissions (intel-sa-01089)
CVE-2024-23908 | Intel FPGA Software prior 11.19.5.0 Flexlm License Daemon insecure inherited permissions (intel-sa-01107)
CVE-2024-23489 | Intel VROC Software 8.0.8.1001 uncontrolled search path (intel-sa-01128)
CVE-2024-28887 | Intel IPP Software prior 2021.11 uncontrolled search path (intel-sa-01129)
grimoire: Generate datasets of cloud audit logs for common attacks
Grimoire Grimoire is a “REPL for detection engineering” that allows you to generate datasets of cloud audit logs for common attack techniques. It currently supports AWS. How it works First, Grimoire detonates an attack....
The post grimoire: Generate datasets of cloud audit logs for common attacks appeared first on Penetration Testing Tools.
CVE-2011-1944 | Apple iOS up to 5.1.1 libxml numeric error (APPLE-SA-2012-09-19-1 / EDB-35810)
Artemis: modular web reconnaissance tool and vulnerability scanner
Artemis A modular web reconnaissance tool and vulnerability scanner based on Karton. Features Artemis includes: subdomain scan using crt.sh, Shodan integration, brute-forcing of interesting paths (e.g. .env), brute-forcing of easy WordPress/MySQL/PostgreSQL/FTP passwords, email...
The post Artemis: modular web reconnaissance tool and vulnerability scanner appeared first on Penetration Testing Tools.
新型 Vo1d 恶意软件曝光,超130万台安卓电视设备已中招
Polaris: open source policy engine for Kubernetes
Polaris Securing workloads in Kubernetes is an important part of overall cluster security. The overall goal should be to ensure that containers are running with as minimal privileges as possible. This includes avoiding privilege...
The post Polaris: open source policy engine for Kubernetes appeared first on Penetration Testing Tools.