Aggregator
CVE-2008-1445 | Microsoft Windows Active Directory LDAP Request input validation (MS08-035 / Nessus ID 33138)
CVE-2008-1446 | Microsoft Windows IIS IPP Service numeric error (MS08-062 / VU#793233)
CVE-2008-1454 | Microsoft Windows 2000 SP4/Server 2003 SP2/Server 2008 DNS cache containing sensitive information (MS08-037 / Nessus ID 72834)
CVE-2014-2303 | webEdition CMS 6.2.7.0/6.3.3.0/6.3.8.0 we_fs.php order sql injection (ID 126862 / EDB-39206)
CVE-2024-56882 | Sage DPW 2020_06_002 Kurzinfo cross site scripting (EUVD-2025-4687)
CVE-2024-56883 | Sage DPW 2020_06_002 User Interface ID access control (EUVD-2025-4685)
CVE-2025-25892 | D-Link DSL-3782 1.01 Packet sstartip/sendip/dstartip/dendip denial of service (EUVD-2025-4680)
CVE-2025-25891 | D-Link DSL-3782 1.01 Packet destination/netmask/gateway denial of service (EUVD-2025-4682)
CVE-2024-50608 | Fluent Bit 3.1.9 prom_rw_prot.c process_payload_metrics_ng null pointer dereference (EUVD-2025-4684 / Nessus ID 216915)
Zero Trust Architecture Building Resilient Defenses for 2025
In an era where cyber threats continuously evolve and traditional security perimeters become obsolete, Zero Trust Architecture for 2025 has emerged as the cornerstone of modern cybersecurity strategies. As we move deeper into 2025, organizations are not just adopting Zero Trust principles but enhancing and evolving them into more dynamic, AI-powered security frameworks to combat […]
The post Zero Trust Architecture Building Resilient Defenses for 2025 appeared first on Cyber Security News.
CVE-2025-25894 | D-Link DSL-3782 1.01 Packet samba_wg/samba_nbn os command injection (EUVD-2025-4678)
CVE-2025-25893 | D-Link DSL-3782 1.01 Packet inIP/insPort/inePort/exsPort/exePort/protocol os command injection (EUVD-2025-4679)
CVE-2025-25895 | D-Link DSL-3782 1.01 Packet public_type os command injection (EUVD-2025-4675)
CVE-2025-25896 | D-Link DSL-3782 1.01 Packet destination/netmask/gateway denial of service (EUVD-2025-4674)
端午安康 · 知识同行 | 解锁 .NET 安全领域最专业的知识库,技术干货一网打尽!
WebShell 对抗进化,规避w3wp进程树监测,黑屏之下绕过 cmd.exe
.NET 内网攻防实战电子报刊
Network Intrusion Detection for Emerging 2025 Cyber Threats
As we navigate through 2025, cybersecurity professionals face an increasingly sophisticated threat landscape. Network Intrusion Detection Systems (IDS) have become essential guardians against evolving digital threats that target organizations worldwide. With cybercrime costs projected to surge from $9.22 trillion in 2024 to $13.82 trillion by 2028, the race between attackers and defenders has never been […]
The post Network Intrusion Detection for Emerging 2025 Cyber Threats appeared first on Cyber Security News.
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Linux kernel vulnerability reproduction is a critical task in system security. To reproduce a kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program are needed. Most existing research focuses on the...
The post KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities appeared first on Penetration Testing Tools.