Aggregator
CVE-2024-10446 | Project Worlds Online Time Table Generator 1.0 admindashboard.php?info=add_course c sql injection
Submit #432501: code-projects Blood Bank Management System 1 Cross-Site Request Forgery [Accepted]
Gentoo 引入了 DTrace
Submit #432372: Project Worlds Online Time Table Generator 1.0 SQL Injection [Accepted]
Submit #432371: Project Worlds Online Time Table Generator 1.0 SQL Injection [Accepted]
Открытый код, закрытые двери: как Минцифры ответит на отстранение российских разработчиков Linux
CVE-2005-2847 | Barracuda Networks Barracuda Spam Firewall 3.1.16 Firmware img.pl privileges management (EDB-1236 / Nessus ID 19556)
A good cyber leader prioritizes the greater good
In the war against malicious cyber activity, it’s time for security vendors to step in – and it’s not how you might think. CISA Director Jen Easterly put it right at this year’s Black Hat conference: “We got ourselves into this; we have to get ourselves out.” Geopolitical tensions are rising worldwide, attacks are becoming increasingly sophisticated, and nation-state threats on US organizations and critical infrastructure are at an all-time high. As we prepare to … More →
The post A good cyber leader prioritizes the greater good appeared first on Help Net Security.
FreeBuf早报 | 香港禁止政务办公电脑使用个人微信;达美航空正式对CS提起诉讼
CVE-2017-2407 | Apple iOS up to 10.2 FontParser memory corruption (HT207617 / EDB-40961)
CVE-2023-27179 | GDidees CMS up to 3.9.1 /_admin/imgdownload.php filename information disclosure (ID 171894 / EDB-51381)
ByteCTF Guess Cookie 出题思路详解
CVE-2008-2920 | EZCMS EZTechhelp EZCMS up to 1.2 improper authentication (EDB-5819 / XFDB-43091)
CVE-2008-6714 | xeCMS 1.0/1.0.0 admin.php improper authentication (EDB-5818 / XFDB-43114)
CVE-2007-5962 | Red Hat Fedora 6/7/8 resource management (EDB-5814 / Nessus ID 32438)
CVE-2008-2918 | Application Dynamics Cartweaver 3.0 details.php prodId sql injection (EDB-5815 / XFDB-43099)
CVE-2008-2922 | T0pp8uzz Dana IRC client up to 1.1 IRC Client memory corruption (EDB-5817 / XFDB-43112)
spring 审计常见 tricks
How isolation technologies are shaping the future of Kubernetes security
In this Help Net Security interview, Emily Long, CEO at Edera, discusses the most common vulnerabilities in Kubernetes clusters and effective mitigation strategies. Long shares insights on emerging isolation technologies that could enhance Kubernetes security and better protect containerized environments. What are the most common vulnerabilities in Kubernetes clusters today, and how can they be mitigated effectively? Kubernetes has made significant progress in security since its inception ten years ago. Security isn’t an afterthought in … More →
The post How isolation technologies are shaping the future of Kubernetes security appeared first on Help Net Security.