Aggregator
Submit #647463: sourcecodester Pet grooming management software August 30, 2025 Unrestricted Upload [Accepted]
CVE-2024-47081 | psf requests URL src/requests/utils.py information disclosure (Nessus ID 240162 / WID-SEC-2025-1699)
CVE-2025-24495 | Intel Core Ultra Processor initialization of resource (intel-sa-01322 / Nessus ID 236930)
CVE-2009-2569 | Verlihub Control Panel 1.7e index.php nick cross site scripting (EDB-32989 / BID-34856)
CVE-2009-2571 | VerliAdmin 0.3.7/0.3.8 index.php nick cross site scripting (EDB-32988 / XFDB-50347)
CVE-2009-4547 | ViArt CMS 3.3.2 forums.php forum_id cross site scripting (EDB-33157 / XFDB-52371)
CVE-2009-3495 | Vastal DVD Zone view_mag.php mag_id sql injection (EDB-33240 / BID-36487)
CVE-2009-3202 | ULoKI ULoKI PHP Forum 2.1 search.php term cross site scripting (EDB-34888 / XFDB-52611)
CVE-2009-3496 | Vastal DVD Zone view_mag.php mag_id cross site scripting (EDB-33241 / BID-36487)
CVE-2009-4817 | Element-IT Ultimate Uploader 1.3.0 File Upload upload.php memory corruption (EDB-10578 / XFDB-54972)
CVE-2009-3081 | Uiga Church Portal index.php month sql injection (EDB-9535 / XFDB-52893)
如何通过AI挖掘浏览器漏洞
《网络空间安全科学学报》被乌利希国际期刊指南(Ulrichsweb)数据库收录
Самая старая могила на Земле? Вымерший Homo naledi мог хоронить людей задолго, до нашего появления
Cyber Privateers: The Return of the Hack-Back Debate
Is the second Trump administration open to private-sector companies — or non-military or other government agencies — using offensive security against cyber threats?
The post Cyber Privateers: The Return of the Hack-Back Debate appeared first on Security Boulevard.
SAP Patches Critical Flaws Allowing Full System Takeover
SAP has addressed two critical vulnerabilities in the NetWeaver Java application server that could allow attackers to execute
The post SAP Patches Critical Flaws Allowing Full System Takeover appeared first on Penetration Testing Tools.
Google’s New Tech Will Prove If a Photo Is Real or AI-Generated
Google has unveiled a new system for authenticating digital images by embedding C2PA Content Credentials into the Pixel
The post Google’s New Tech Will Prove If a Photo Is Real or AI-Generated appeared first on Penetration Testing Tools.
Chrome 140 Update Blocks Legacy Extensions: Here’s How to Fix It
Google has released Chrome 140, and with it, users have encountered new restrictions on extensions built on Manifest
The post Chrome 140 Update Blocks Legacy Extensions: Here’s How to Fix It appeared first on Penetration Testing Tools.
VMScape: A New CPU Vulnerability Threatens Cloud Security
Researchers at ETH Zurich have unveiled a novel attack dubbed VMScape, bearing strong resemblance to Spectre and posing
The post VMScape: A New CPU Vulnerability Threatens Cloud Security appeared first on Penetration Testing Tools.