Aggregator
Convergenza tra IA e cybersecurity: le previsioni di Palo Alto Networks
4 months 3 weeks ago
You Have Less Than Two Months to Become DORA Compliant
4 months 3 weeks ago
You have less than two months to become DORA compliant if your company is based in the EU or does business in the EU.
The post You Have Less Than Two Months to Become DORA Compliant appeared first on Azul | Better Java Performance, Superior Java Support.
The post You Have Less Than Two Months to Become DORA Compliant appeared first on Security Boulevard.
Azul
5 Traditional Approaches to Generating Test Data
4 months 3 weeks ago
We’ll discuss five of the most common methods used to date to generate data and how they stack up for use in testing and development.
The post 5 Traditional Approaches to Generating Test Data appeared first on Security Boulevard.
Expert Insights on Synthetic Data from the Tonic.ai Blog
Blov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation
4 months 3 weeks ago
Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter — a util
先知安全沙龙(北京站) - 安全研究员在红蓝对抗中的自我修养
4 months 3 weeks ago
先知安全沙龙(北京站) - 安全研究员在红蓝对抗中的自我修养
先知安全沙龙(杭州站) - Citrix 云桌面场景的模糊测试实践
4 months 3 weeks ago
先知安全沙龙(杭州站) - Citrix 云桌面场景的模糊测试实践
先知安全沙龙(北京站) - 浅谈Web快速打点
4 months 3 weeks ago
先知安全沙龙(北京站) - 浅谈Web快速打点
先知安全沙龙(北京站) - 滥用 ADWS 协议枚举 Active Directory
4 months 3 weeks ago
先知安全沙龙(北京站) - 滥用 ADWS 协议枚举 Active Directory
CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks
4 months 3 weeks ago
Executive SummaryCyberVolk/GLORIAMIST is a hacktivist collective originating in India w
CVE-2022-26986 | ImpressCMS up to 1.4.3 sql injection (EDB-51056)
4 months 3 weeks ago
A vulnerability has been found in ImpressCMS up to 1.4.3 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2022-26986. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
GitHub - nevillegrech/gigahorse-toolchain: A binary lifter and analysis framework for Ethereum smart contracts
4 months 3 weeks ago
CVE-2015-3240 | Libreswan/Openswan Pluto IKE Daemon numeric error (RHSA-2015:1979 / Nessus ID 86711)
4 months 3 weeks ago
A vulnerability has been found in Libreswan and Openswan and classified as problematic. This vulnerability affects unknown code of the component Pluto IKE Daemon. The manipulation leads to numeric error.
This vulnerability was named CVE-2015-3240. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-3276 | OpenLDAP Multi-Keyword Mode Cipher Request cryptographic issues (RHSA-2015:2131 / Nessus ID 87132)
4 months 3 weeks ago
A vulnerability was found in OpenLDAP. It has been classified as problematic. Affected is an unknown function of the component Multi-Keyword Mode. The manipulation as part of Cipher Request leads to cryptographic issues.
This vulnerability is traded as CVE-2015-3276. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-3277 | mod_nss up to 1.0.10 on Fedora Multi-keyword Cipherstring Parser information disclosure (Nessus ID 86683 / ID 124328)
4 months 3 weeks ago
A vulnerability was found in mod_nss up to 1.0.10 on Fedora. It has been classified as problematic. Affected is an unknown function of the component Multi-keyword Cipherstring Parser. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2015-3277. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2015-3281 | HAProxy up to 1.5.13 buffer_slow_realign memory corruption (USN-2668-1 / Nessus ID 84511)
4 months 3 weeks ago
A vulnerability classified as problematic was found in HAProxy up to 1.5.13. This vulnerability affects the function buffer_slow_realign. The manipulation leads to memory corruption.
This vulnerability was named CVE-2015-3281. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2009-1209 | W3 Amaya 11.1 memory corruption (EDB-8314 / XFDB-47399)
4 months 3 weeks ago
A vulnerability was found in W3 Amaya 11.1. It has been rated as very critical. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2009-1209. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1508 | Keir Davis X-Forum 0.6.2 Common.php xforum_validateUser cookie_username sql injection (EDB-8317 / XFDB-49537)
4 months 3 weeks ago
A vulnerability was found in Keir Davis X-Forum 0.6.2. It has been classified as critical. Affected is the function xforum_validateUser of the file Common.php. The manipulation of the argument cookie_username leads to sql injection.
This vulnerability is traded as CVE-2009-1508. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1512 | Keir Davis X-Forum 0.6.2 Config.php adminEMail code injection (EDB-8317 / XFDB-50390)
4 months 3 weeks ago
A vulnerability classified as critical was found in Keir Davis X-Forum 0.6.2. This vulnerability affects unknown code of the file Config.php. The manipulation of the argument adminEMail leads to code injection.
This vulnerability was named CVE-2009-1512. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-4791 | Ryan Haudenschilt Family Connections up to 1.5 addressbook.php email sql injection (EDB-8319 / BID-34297)
4 months 3 weeks ago
A vulnerability classified as critical was found in Ryan Haudenschilt Family Connections up to 1.5. Affected by this vulnerability is an unknown functionality of the file addressbook.php. The manipulation of the argument email leads to sql injection.
This vulnerability is known as CVE-2009-4791. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com