Aggregator
Meow
11 months ago
cohenido
CVE-2006-6525 | EzHRS HR Assist up to 1.05 vdateusr.asp password sql injection (EDB-2909 / XFDB-30847)
11 months ago
A vulnerability, which was classified as critical, was found in EzHRS HR Assist up to 1.05. Affected is an unknown function of the file vdateusr.asp. The manipulation of the argument password leads to sql injection.
This vulnerability is traded as CVE-2006-6525. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2018-4347 | Apple tvOS up to 11.4.1 use after free (Nessus ID 118178 / ID 371218)
11 months ago
A vulnerability, which was classified as critical, was found in Apple tvOS up to 11.4.1. Affected is an unknown function. The manipulation leads to use after free.
This vulnerability is traded as CVE-2018-4347. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
报告:云安全威胁形势未根本缓解,四大问题凸显
11 months ago
揭示企业环境中最主要的云安全威胁。
AlpacaHack Round 5 (Crypto)
11 months ago
Name: AlpacaHack Round 5 (Crypto) (an AlpacaHack event.)
Date: Oct. 12, 2024, 3 a.m. — 12 Oct. 2024, 09:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://alpacahack.com/ctfs/round-5
Rating weight: 0
Event organizers: AlpacaHack
Date: Oct. 12, 2024, 3 a.m. — 12 Oct. 2024, 09:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://alpacahack.com/ctfs/round-5
Rating weight: 0
Event organizers: AlpacaHack
Haus der Flaggen/Flag Heist
11 months ago
Name: Haus der Flaggen/Flag Heist (an Laokoon Security CTF event.)
Date: Oct. 12, 2024, 8 a.m. — 12 Oct. 2024, 18:00 UTC [add to calendar]
Format: Jeopardy
On-site
Location: IBM Garage for Defense, Godesberger Allee 127, Bonn
Offical URL: https://laokoon-security.com/ctf2024
Rating weight: 21.00
Event organizers: Laokoon SecurITy
Date: Oct. 12, 2024, 8 a.m. — 12 Oct. 2024, 18:00 UTC [add to calendar]
Format: Jeopardy
On-site
Location: IBM Garage for Defense, Godesberger Allee 127, Bonn
Offical URL: https://laokoon-security.com/ctf2024
Rating weight: 21.00
Event organizers: Laokoon SecurITy
共建可信透明安全体验!vivo颁发2024最佳安全合作伙伴奖项
11 months ago
vivo颁发2024最佳安全合作伙伴奖项
2024 VDC安全与隐私会场:持续构建安全能力,应对AIGC时代新挑战
11 months ago
拥抱AI,共建可信透明安全体验。
泄露全球3.44亿人信息!万豪酒店同意支付3.6亿元和解
11 months ago
PHP PWN 入门调试
11 months ago
看雪论坛作者ID:mb_vdcqxebg
SDC2024议题聚焦 | BULKHEAD:通过分隔化打造内核安全的水密舱
11 months ago
分隔化内核模块以限制潜在漏洞的影响
青藤天睿RASP获评“2024世界计算大会专题展优秀成果”
11 months ago
青藤,让云更安全
OpenAI:伊朗国家黑客利用 ChatGPT 密谋 ICS 攻击
11 months ago
提到了据称与伊朗存在关联的两个黑客组织
CISA:黑客滥用F5 BIG-IP cookie 映射内部服务器
11 months ago
速修复
手搓渗透测试发包检测工具
11 months ago
go语言批量指定指纹及漏洞识别工具
CVE-2021-23953 | Mozilla Firefox/Firefox ESR/Thunderbird PDF Reader cross-domain policy (Nessus ID 208628)
11 months ago
A vulnerability has been found in Mozilla Firefox, Firefox ESR and Thunderbird and classified as critical. This vulnerability affects unknown code of the component PDF Reader. The manipulation leads to permissive cross-domain policy with untrusted domains.
This vulnerability was named CVE-2021-23953. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
2024年10月投稿指南
11 months ago
G.O.S.S.I.P 专栏2024年10月投稿指南
CVE-2020-2601 | Oracle Java SE 7u241/8u231/11.0.5/13.0.1 Security information disclosure (Nessus ID 208630)
11 months ago
A vulnerability classified as critical was found in Oracle Java SE 7u241/8u231/11.0.5/13.0.1. This vulnerability affects unknown code of the component Security. The manipulation leads to information disclosure.
This vulnerability was named CVE-2020-2601. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2021-30465 | runc up to 1.0.0-rc94 Configuration pathname traversal (Nessus ID 208629)
11 months ago
A vulnerability, which was classified as critical, has been found in runc up to 1.0.0-rc94. This issue affects some unknown processing of the component Configuration Handler. The manipulation leads to pathname traversal.
The identification of this vulnerability is CVE-2021-30465. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com