Aggregator
CVE-2012-10033 | Ångström Distribution Project Narcissus backend.php configure_image release os command injection (EUVD-2012-6574 / EDB-22709)
CVE-2013-10067 | Glossword up to 1.8.12 Administrative Interface gw_admin.php unrestricted upload (EUVD-2013-7282 / EDB-24456)
OpenAI вспомнила про open-source и разрешила скачать GPT-OSS
阿里云产品安全招聘SDL
阿里云产品安全招聘SDL
Project Ire: Microsoft’s AI System That Hunts Malware Without Humans
Microsoft has unveiled an autonomous artificial intelligence system capable of analyzing and classifying software without any human intervention. The prototype, named Project Ire, is designed to detect malicious code at scale. According to Microsoft...
The post Project Ire: Microsoft’s AI System That Hunts Malware Without Humans appeared first on Penetration Testing Tools.
Human Hackers Dethroned: An AI Takes Top Spot on HackerOne
The top spot in HackerOne’s global ranking is no longer held by a human, but by a machine. Behind the alias “XBOW” is not a living researcher, but an AI-driven system that has already...
The post Human Hackers Dethroned: An AI Takes Top Spot on HackerOne appeared first on Penetration Testing Tools.
Cursor Remote Code Execution Vulnerability (CVE-2025-54135)
CVE-2025-52203 | DevaslanPHP project-management 1.2.4 Ticket Name cross site scripting
CVE-2025-50867 | CloudClassroom-PHP-Project 1.0/2.php POST Parameter takeassessment2.php Q5 sql injection
CVE-2024-34327 | Sielox AnyWare 2.1.2 Password Reset email address sql injection
CVE-2012-10029 | Nagios XI Graph Explorer up to 1.2 visApi.php host os command injection (EUVD-2012-6575 / EDB-23227)
CVE-2025-8436 | projectworlds Online Admission System 1.0 /viewdoc.php ID sql injection
CVE-2025-51503 | Microweber CMS 2.0 User Profile cross site scripting (EUVD-2025-23298)
CVE-2025-8426 | Marvell QConvergeConsole 5.5.0.78 compressConfigFiles path traversal (ZDI-25-733 / EUVD-2025-23297)
Legitimate Tools, Malicious Intent: How Attackers Weaponize RMM Software
Trust in familiar IT tools is increasingly being weaponized by malicious actors: remote monitoring and management (RMM) solutions—originally designed for administration and support—are now leveraged for attacks, covert control, and data exfiltration. Security professionals...
The post Legitimate Tools, Malicious Intent: How Attackers Weaponize RMM Software appeared first on Penetration Testing Tools.
[修复指南] 谷歌Chrome v139.0更新翻车 部分用户遇到黑屏/灰屏/白屏
Urgent: Google Patches Actively Exploited Flaws in Android Devices
Google has released a series of urgent security updates for Android, addressing multiple critical vulnerabilities, including two actively exploited flaws within Qualcomm components. This round of patches places particular emphasis on CVE-2025-21479 (rated 8.6...
The post Urgent: Google Patches Actively Exploited Flaws in Android Devices appeared first on Penetration Testing Tools.